思科的审计工具包装说明

perl脚本扫描常见的漏洞Cisco路由器。

思科的审计工具首页 | 卡利思科的审计工具回购

  • 作者:g0ne
  • 许可:GPL第二版

    0x01 包括在思科的审计工具包工具

    CAT - 扫描常见的漏洞Cisco路由器
    :~# CAT
    Cisco Auditing Tool - g0ne [null0]
    Usage:
      -h hostname (for scanning single hosts)
      -f hostfile (for scanning multiple hosts)
      -p port #   (default port is 23)
      -w wordlist (wordlist for community name guessing)
      -a passlist (wordlist for password guessing)
      -i [ioshist]    (Check for IOS History bug)
      -l logfile  (file to log to, default screen)
      -q quiet mode   (no screen output)
    

    0x02 思科的审计工具用法示例

    扫描主机 (-h 192.168.99.230) 上的端口 23(-p 23), 使用密码字典文件 (-a /usr/share/wordlists/nmap.lst):
:~# CAT -h 192.168.99.230 -p 23 -a /usr/share/wordlists/nmap.lst 
Cisco Auditing Tool - g0ne [null0]
Checking Host: 192.168.99.230
Guessing passwords: 
Invalid Password: 123456
Invalid Password: 12345

原文来自https://www.hackfun.org/kali-tools/cisco-auditing-tool_zh.html。转载请注明原出处,商用请联系原作者授权。

results matching ""

    No results matching ""