CVE-2024-3400

This script is a simple tool for exploiting vulnerable PAN-OS firewalls. It allows users to perform attacks against vulnerable PAN-OS firewalls by injecting custom payloads into them. The script can be run by entering values directly or by using a CSV file containing a list of targets.

Usage:

Running the Script with Direct Values:

  1. Make sure you have Python 3.x installed along with the required libraries.
  2. Download or clone this repository into your system.
  3. Open a terminal or command prompt and navigate to the directory where you have saved this repository.
  4. Run the script by executing the command python3 exploit.py.
  5. Choose option 'D' to enter values directly.
  6. Follow the prompts to input the firewall IP address, payload to be executed, and the path to the root CA certificate if required.

Running the Script with a CSV File:

  1. Make sure you have Python 3.x installed along with the required libraries.
  2. Prepare a CSV file containing a list of targets you want to attack. The format should be three columns: firewall IP address, payload, and the path to the root CA certificate (optional).
  3. Save the CSV file to a location on your system.
  4. Download or clone this repository into your system.
  5. Open a terminal or command prompt and navigate to the directory where you have saved this repository.
  6. Run the script by executing the command python3 exploit.py.
  7. Choose option 'C' to use a CSV file.
  8. Enter the path to the CSV file when prompted.
  9. The script will read the CSV file, exploit each listed target, and print the results.

Make sure to use this tool responsibly and only for legitimate purposes. Misusing this tool to conduct unauthorized attacks is strictly prohibited.

Exploit