Skip to content

tanm-sys/secure-ssl-vpn-exploit-kit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 

Repository files navigation

secure-ssl-vpn-exploit-kit

Advanced Pulse Connect Secure VPN Exploitation Script

Pulse Secure Logo

Table of Contents

  1. Introduction
  2. Features
  3. Requirements
  4. Installation
  5. Usage
  6. Options
  7. Examples
  8. Output
  9. Advanced Usage
  10. Contributing
  11. License
  12. Credits

1. Introduction

The Advanced Pulse Connect Secure VPN Exploitation Script is a powerful tool designed for exploiting vulnerabilities in Pulse Connect Secure VPN, specifically targeting the CVE-2019-11510 vulnerability. It provides security researchers and professionals with the capability to extract critical information such as private keys, usernames, admin details, observed logins, and VPN session cookies from files downloaded via the exploit.

2. Features

Comprehensive Extraction

  • Extracts private keys, usernames, admin details, observed logins, and VPN session cookies from vulnerable Pulse Connect Secure VPN instances.

Automated Download

  • Supports downloading necessary files (configuration, cache, and session files) from the target VPN for offline analysis.

Session Cookie Testing

  • Tests session cookies to identify active VPN sessions, facilitating further investigation and potential hijacking.

SSH Key Extraction

  • Extracts SSH keys from downloaded files, providing additional avenues for exploitation and lateral movement.

Detailed Reporting

  • Generates detailed reports for each target, providing organized and actionable insights into the extracted information.

Multi-Target Support

  • Allows exploitation and extraction from multiple targets simultaneously, streamlining large-scale assessments.

3. Requirements

To use this script, ensure you have the following dependencies installed:

  • Bash: The script is written in Bash, the Bourne Again SHell.

  • curl: Command-line tool for transferring data with URL syntax.

  • unzip: Tool for extracting files from ZIP archives.

  • dig: Tool for querying DNS name servers.

4. Installation

To install the script, simply clone the repository to your local machine:

git clone https://github.com/yourusername/advanced-pulse-vpn-exploit.git
cd advanced-pulse-vpn-exploit

Ensure that the script file (exploit.sh) has executable permissions:

chmod +x exploit.sh

5. Usage

To use the script, simply execute it with the appropriate options. See the Options section for details on available options.

./exploit.sh [options]

6. Options

  • -h: Display the help message.

  • -t <target>: Set the target IP address or domain name. Multiple targets can be specified in a CSV file or as individual arguments.

  • -d: Download configuration, cache, and session files from the target VPN.

  • -c: Test cookies to identify active sessions. This option also requires downloading files.

  • -k: Test cookies without downloading files. Assumes that files are already downloaded and extracted.

  • -s: Extract SSH keys from downloaded files. Requires downloading files.

  • -a: Perform all tests (download files, test cookies, and extract SSH keys).

7. Examples

Perform all tests on a single target:

./exploit.sh -t 192.168.1.100 -a

Test cookies on multiple targets listed in a CSV file:

./exploit.sh -t targets.csv -c

Extract SSH keys from a single target:

./exploit.sh -t vpn.example.com -s

8. Output

The script creates a directory named DATA in the current working directory to store extracted data and reports for each target. Detailed reports are generated for each target, including extracted information such as product version, SSH keys, admin details, and VPN session cookies.

9. Advanced Usage

For advanced usage, you can customize the script to add new features or integrate it into your existing security toolchain. Additionally, you can modify the script to target specific vulnerabilities or environments by adjusting the extraction logic or adding new modules.

10. Contributing

Contributions to this project are welcome! Feel free to fork the repository, make improvements or bug fixes, and submit pull requests. Please ensure that

your code adheres to the project's coding standards and practices.

11. License

This project is licensed under the MIT License. See the LICENSE file for details.

12. Credits

This script is based on research by Orange Tsai and Meh Chang as detailed in their blog post: Attacking SSL VPN Part 3: Golden Pulse Secure RCE Chain.

Special thanks to Alyssa Herrera and 0xDezzy for additional insights, and bl4ckh0l3z for fixing, cleaning, and refactoring the original code.


About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages