SSHScout is a lightweight, efficient tool designed to identify servers running SSH. Designed to be your go-to tool for SSH banner grabbing, combining speed, accuracy, and ease of use. This script facilitates rapid scanning of multiple IP addresses, domain names to detect SSH server version banner. Whether you're managing a large network or conducting a targeted security audit, SSHScout provides the critical information you need to keep your systems secure and up-to-date.
- Port Check: Identifies closed ports and provides a summary of non-responsive hosts.
- Banner Retrieval: Efficiently retrieves SSH banners without authentication.
- Vulnerability Check: Scan multiple IP addresses, domain names for the CVE-2024-6387 and other vulnerabilities.
- Multi-threading: Uses threading for concurrent checks, significantly reducing scan times.
- Detailed Output: Provides clear output summarizing scan results.
python SSHScout.py <targets>
python SSHScout.py 192.168.1.1
python SSHScout.py 91.191.200.30 proxy.domain.com
The script will provide a summary of the scanned targets:
+------------------+-----------------------------------------+-------------------------------+
| Domain/IP | SSH Banner | CVE |
+------------------+-----------------------------------------+-------------------------------+
| proxy.domain.com | SSH-2.0-OpenSSH_7.9p1 Debian-10+deb10u4 | CVE-2018-20685 |
| 91.195.204.40 | SSH-2.0-OpenSSH_8.5p1-hpn15v2 | CVE-2021-28041, CVE-2024-6387 |
+------------------+-----------------------------------------+-------------------------------+
The script will provide a summary of the scanned targets:
- 🚨 Vulnerable: Servers running a vulnerable version of OpenSSH with CVE ID.
- 🛡️ Not Vulnerable: Servers running a non-vulnerable version of OpenSSH.
- 🔒 Closed Ports: Count of servers with port 22 closed.