| 1 | + | # PAN-OS Firewall Exploit Script |
| 2 | + | This script is designed to demonstrate the exploitation of vulnerabilities in PAN-OS firewalls. It sends a specially crafted payload to the firewall's API endpoint to execute arbitrary commands. |
| 3 | + | |
| 4 | + | **Note:** Please ensure that you only use this script for legal and ethical purposes, and only on machines that you have permission to test on. |
| 5 | + | |
| 6 | + | ## Usage |
| 7 | + | |
| 8 | + | To use this project, follow these steps: |
| 9 | + | |
| 10 | + | 1. Clone this repo: |
| 11 | + | ```bash |
| 12 | + | git clone https://github.com/DrewskyDev/CVE-2024-3400 |
| 13 | + | |
| 14 | + | 2. Change directory to the repo: |
| 15 | + | ```bash |
| 16 | + | cd CVE-2024-3400 |
| 17 | + | |
| 18 | + | 3. Install the required modules: |
| 19 | + | ```bash |
| 20 | + | pip install -r requirements.txt |
| 21 | + | |
| 22 | + | 4. Run the python script. |
| 23 | + | ```bash |
| 24 | + | python3 PoC.py |
| 25 | + | |
| 26 | + | Follow the prompts to enter the IP address of the vulnerable PAN-OS firewall and the payload to execute. |
| 27 | + | Optionally, enter 'q' to quit the script. |
| 28 | + | |