Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/nccgroup/cisco-snmp-enumeration
Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking
https://github.com/nccgroup/cisco-snmp-enumeration
Last synced: about 2 months ago
JSON representation
Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking
- Host: GitHub
- URL: https://github.com/nccgroup/cisco-snmp-enumeration
- Owner: nccgroup
- License: agpl-3.0
- Created: 2013-05-09T19:53:50.000Z (over 11 years ago)
- Default Branch: master
- Last Pushed: 2015-12-29T15:32:49.000Z (about 9 years ago)
- Last Synced: 2024-11-10T23:32:09.721Z (2 months ago)
- Language: Shell
- Homepage:
- Size: 147 KB
- Stars: 219
- Watchers: 36
- Forks: 81
- Open Issues: 3
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-security-collection - **180**星
README
Cisc0wn - Cisco SNMP Script
============================================Cisco SNMP enumeration, brute force, config downloader and password cracking script.
Tested and designed to work against Cisco IOS Switches and Routers.
Released as open source by NCC Group Plc - http://www.nccgroup.com/
Developed by Daniel Compton, daniel dot compton at nccgroup dot com
Fixed and updated by Tom Watson, tom dot watson at nccgroup dot com
Minor Comit by Darren McDonald, darren dot mcdonald at nccgroup dot com
Updated by Jason Soto, jason_soto at jsitech dot com
https://github.com/nccgroup/cisco-SNMP-enumeration
Released under AGPL see LICENSE for more information
Installing
=======================
git clone https://github.com/nccgroup/cisco-SNMP-enumeration.gitHow To Use
=======================
./cisc0wn.shFeatures
=======================* Checks SNMP is enabled on the route
* Brute forces the SNMP Read Only and Read Write community strings (can edit which wordlist it uses in script header)
* Enumerates information such as IOS version, hostname, Arp table, Routing table, interface list and IP addresses using the RO or RW community string.
* If RW community was found it will then download the router config automatically.
* It then searches and displays any enable or telnet passwords in clear text.
* If it finds Cisco type 7 encoded enable or telnet passwords it will auto decode them.
* It will display the Enable secret type 5 password and attempt to crack the MD5. It uses John first with its built in wordlist for speed. If this fails it will try and full crack.Requirements
=======================
* Metasploit http://www.metasploit.comTested on Backtrack 5 and Kali.
New Version Tested in Kali Sana
Screen Shot
=======================Change Log
=======================Version 1.8 - Syntax Error in msfconsole Commands Corrected, Part of the Script still using msfcli moved to msfconsole, Updated commands and john password list locations
Version 1.7 - Syntax error causing bug when no enable secrets in config file corrected
Version 1.6 - Updated to reflect changes in metasploit filesystem use, made grep case insensitive to avoid false negatives, added new location for community string file & moved from the deprecated msfcli to msfconsole -x syntax
Version 1.5 - Official release.