what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 70 RSS Feed

Files

cisco_ddos.txt
Posted Apr 17, 2006
Authored by Chris Turner

A PoC mirc script that uses a list of Cisco routers to perform a ddos attack against an arbitrary IP.

tags | arbitrary
systems | cisco
SHA-256 | 2005ec54ae0324675748386cee5d53e24dac1bd7234597703f7e70461b5a6b47
ciscopack.tar.gz
Posted Apr 6, 2006
Authored by Janis Vizulis - Arhont Ltd | Site hackingexposedcisco.com

This is the IOS binary image packing and unpacking for reverse engineering program capable of calculating a correct checksum for these images.

systems | cisco
SHA-256 | 14ea902c6b350ddcf1c39c10938e90194d7999bb6cb7ea744ea111062d369d36
eigrp-tools.tar.gz
Posted Apr 6, 2006
Authored by Janis Vizulis - Arhont Ltd | Site hackingexposedcisco.com

EIGRP Tools - This is a custom EIGRP packet generator and sniffer developed to test the security and overall operation quality of this Cisco routing protocol. Using this tool requires a decent level of knowledge of EIGRP operations, packets structure and types, as well as the Layer 3 topology of an audited network.

tags | protocol
systems | cisco
SHA-256 | f8918de3a4115310e2c6fb3f16c9d1d669736e7d41b9985c6de42cc177d00707
ciscobnc.c
Posted Oct 31, 2005
Authored by chrak | Site chrakworld.com

Cisco BNC server version 0.9.

systems | cisco
SHA-256 | c7f0b6804607ee190daacba69c70d365eff322b2f77daa2948c58c10af166915
cb4n6.c
Posted Oct 26, 2005
Authored by rotor | Site c1zc0.com

This is a ipv6 banner grabber by c1zc0 Security

systems | cisco
SHA-256 | e85388d2e1be213c5e3ff508b15076266d49cb3ff37175580006ed793cf2433e
c1zc0-mgx.pl
Posted Oct 26, 2005
Authored by rotor | Site c1zc0.com

This is a basic cisco mgx scanner that scans for default passwords.

systems | cisco
SHA-256 | 645f8f559a0d20025f86a35683429de0b85591f451ec739fd80a1c5d15bc5966
CiscoPasswordRevealer.rar
Posted Oct 25, 2005
Authored by HAL 9000 | Site newgre.net

The Cisco Password Revealer - The Cisco VPN Client uses weak encryption to store user and group passwords in your local profile file. This tool will reveal the saved passwords from a given profile file.

tags | local
systems | cisco
SHA-256 | c4ff59418cd930f1acca106838a55edcabaf247be8c0aad743f2a6a996e54ab2
ciscocrack2.c
Posted Oct 4, 2005
Authored by Jerome Poggi | Site hsc.fr

Updated version of ciscocrack.c that works with newer versions of IOS.

systems | cisco
SHA-256 | b141c8116eb3ba9673fa64a8aa60bf04f0e2c80c35e07352ac384ee2be6d1d76
pla-1.01.tar.gz
Posted Jul 1, 2005
Authored by Kris Philipsen | Site pixla.sourceforge.net

PIX Logging Architecture is a project allowing for correlation of Cisco PIX Firewall traffic, IDS, and informational logs. It parses Cisco PIX logs from syslog files, then pushes the parsed data to a database. It contains a Web-based front end for displaying and searching the Cisco PIX Firewall logs.

tags | web
systems | cisco
SHA-256 | 7acfcd8b49939dabb88c407d381b67bea6040cbcc34c4daf647db0ff9a19f225
cisco-torch-0.4b.tar.bz2
Posted Mar 24, 2005
Authored by Arhont Team | Site arhont.com

Cisco Torch mass scanning, fingerprinting, and exploitation tool was written while working on the next edition of the "Hacking Exposed Cisco Networks", since the tools availalbe on the market could not meet our needs. The main feature that makes Cisco-torch different from similar tools is the extensive use of forking to launch multiple scanning processes on the background for maximum scanning efficiency. Also, it uses several methods of application layer fingerprinting simultaneously, if needed.

systems | cisco
SHA-256 | 652f3ffd352987862023f21352d71cd9b85d877cd03282f393f3d00cedee8a5a
cisco-torch-0.3b.tar.bz2
Posted Feb 25, 2005
Authored by Arhont Team | Site arhont.com

Cisco Torch mass scanning, fingerprinting, and exploitation tool.

Changes: Significant code optimizations and improvements, CIDR notations now taken in as input properly, more telnet fingerprints added.
systems | cisco
SHA-256 | efb3ff7d20e54da1992e6864bb97e8d56dab0be89ea05b53bce92b918dc8e4a2
brute_cisco.exp
Posted Feb 25, 2005
Authored by Mr. Parinya Jutasen

Brute force utility for Cisco password authentication.

systems | cisco
SHA-256 | 04878f9fcd2bba9a6a3be629e0e71407e6f2270b6bfdf8eb88077703d5592a2e
cisco-torch.tar.bz2
Posted Jan 27, 2005
Authored by Arhont Team | Site arhont.com

Cisco Torch mass scanning, fingerprinting, and exploitation tool. First alpha release.

systems | cisco
SHA-256 | 5d0502874b3a66bdc6eba7e8cd3ef8bbad03d0f5212ec02084ff276f03dae106
ciscos.c
Posted Dec 31, 2004
Authored by Okiwan

Ciscos.c v1.3 scans class A, B, and C networks for cisco routers which have telnet open and have not changed the default password from cisco.

systems | cisco
SHA-256 | d1deb912c70beb14627c0e4da35e09dec626e2cad00fbb09d7a7c55a0827be63
glFlow-0.1.1.tar.gz
Posted Dec 11, 2004
Authored by Vlad GALU | Site night.rdslink.ro

glFlow is a pcap-based traffic analysis tool intended for monitoring high speed links. The detection algorithm is based on realtime NetFlow traffic aggregation and analysis. The code is portable across platforms, it should work on every system with working md4/md5 and pcap implementations, with very little modifications.

Changes: The DSCP is printed out when there's an event. The IPs are printed in dotted notation rather than as unsigned long integers.
systems | cisco
SHA-256 | ae65c85f078fcd55f2924cc22ad11b6a1e9db36f0075977f6ca03135e9512385
Cisco6509_Reverse.tar.bz2
Posted Nov 21, 2004
Authored by Milos Koprla

Simple C tool and binutils patch with step by step description (HowTo_Reverse_engineering_Cisco_image.html) how to convert cisco image to MIPSIV file for reverse engineering. Allows you to dump and disassemble the text section, tested on a Cisco Catalyst 6509.

systems | cisco
SHA-256 | 05e5bd5d08fdbbcc327796acbc9bf7c17d413e25120d2c77635999b856359d1f
glFlow-0.0.4.tar.gz
Posted Aug 13, 2004
Authored by Vlad GALU | Site night.rdslink.ro

glFlow is a pcap-based traffic analysis tool intended for monitoring high speed links. The detection algorithm is based on realtime NetFlow traffic aggregation and analysis. The code is portable across platforms, it should work on every system with working md4/md5 and pcap implementations, with very little modifications.

Changes: Fixed building with GCC 3.4.
systems | cisco
SHA-256 | 79b6a64f34273efc4ea59eb78160b32bfa41a87b272f780622e85b0db649cf22
glFlow-0.0.3.tar.gz
Posted Jul 17, 2004
Authored by Vlad GALU | Site night.rdslink.ro

glFlow is a pcap-based traffic analysis tool intended for monitoring high speed links. The detection algorithm is based on realtime NetFlow traffic aggregation and analysis. The code is portable across platforms, it should work on every system with working md4/md5 and pcap implementations, with very little modifications.

Changes: Added support for fragmented flood detection, using a little hack.
systems | cisco
SHA-256 | 04f57658bd93580beb4d38f158a69fd06e543e8d2d095e6403fe5360cd7d6a12
glFlow-0.0.2.tar.gz
Posted Jul 9, 2004
Authored by Vlad GALU | Site night.rdslink.ro

glFlow is a pcap-based traffic analysis tool intended for monitoring high speed links. The detection algorithm is based on realtime NetFlow traffic aggregation and analysis. The code is portable across platforms, it should work on every system with working md4/md5 and pcap implementations, with very little modifications.

systems | cisco
SHA-256 | b4d4af5cf3891475b9a0f9ae591a79cd1583d1895b3e95d3acbab9fee2758b06
ioscommands.shtml
Posted Jun 10, 2004

Simple command reference chart for Cisco IOS.

systems | cisco
SHA-256 | 003e265e3fdd250b8ce1669cf175b73bee530ab50625b8afcdf732bb045773db
ttt-1.3r.tar.gz
Posted Apr 24, 2004
Authored by Cisco Systems Critical Infrastructure Assurance Group | Site cisco.com

Modified version of Cisco CIAG's TCP Test Tool ttt. This tool can generate TCP segments with arbitrary values for any field in the IP or TCP headers. A TCP payload can be added to the segment by specifying the file with the payload in the command line or by passing the payload via standard input.

tags | arbitrary, tcp
systems | cisco
advisories | CVE-2004-0230
SHA-256 | 85937f14166961edbc2d383ef7c718a74f2104a135efc9f5ccdea7b8e5f99e2e
ccsat.txt
Posted Feb 10, 2004
Authored by Bill Zeng | Site hotunix.com

CCSAT (Cisco Configuration Security Auditing Tool) is a script to allow automated audit of configuration security of large numbers of Cisco routers and switches. The tool is based upon industry best practices including Cisco, NSA and SANS security guides and recommendations. It is flexible and can report details down to individual device interfaces, lines, ACL's, AS's, etc.

systems | cisco
SHA-256 | e683975bedeb703bd09a16d28a825d8b15f090e0c41adba9736f8adc714566a6
iosniff.tgz
Posted Aug 10, 2003
Authored by FX | Site phenoelit.de

Cisco Systems IOS 11.x UDP echo memory leak remote sniffer. The UDP echo service (UDP port 7) has to be enabled on the device. The bug will cause the Cisco router to send about 20 kilobytes of data from the interface buffer pools containing packets in the send/recv/forward queues. This tool will identify IOS memory blocks, find the router specific offset for packets in the block and decode the packet to the screen. Note that this is not a full dump of the traffic through the remote router but rather a subset of received data. Features include a packet checksum cache to prevent repeated output of the same packet, auto identification of packets and buffer offsets, and IPv4 decoding.

tags | remote, udp, memory leak
systems | cisco
SHA-256 | 88c96f5f35ee8e8f230938a70d6e512ac19d921be8f468c01cdb28507adc9a83
simple.pl
Posted Jul 22, 2003
Authored by Fugi

Simple brute forcing utility to audit Cisco network devices.

systems | cisco
SHA-256 | 401085ebf79d3df4a0fa20d1ad5e10d72692d708ae9f4977f598fece73242f47
anwrap.pl
Posted Nov 25, 2002
Authored by Ron Sweeney, Brian Barto

anwrap is a wrapper for ancontrol that serves as a dictionary attack tool against LEAP enabled Cisco Wireless Networks. It traverses a user list and password list attempting authentication and logging the results to a file.

systems | cisco
SHA-256 | 5b2c150321984726d6e8b0dce2701c05c125c16ac8cf177cc9d5351ee2046d15
Page 2 of 3
Back123Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close