exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 70 of 70 RSS Feed

Files

tomas.zip
Posted May 5, 2002
Authored by Michael Thumann | Site ernw.de

Too Many Secrets v0.7beta is a commandline tool to crack the enable secret passwords on Cisco routers. You need the md5 password hash from the config to run this tool. It contents dictionary and brute force attacks and a nice feature to combine brute forcing with a partial known password string.

systems | cisco
SHA-256 | 366dc501186b5563d654914b6ef0551d25c486d445fe8fd8ca3faba1c9fa666f
Cisco_crack.tar.gz
Posted Aug 30, 2001
Authored by B-root

Cisco Crack is Cisco device login brute force tool.

systems | cisco
SHA-256 | 1637fb1059d052d1e5f35500e03feea356daff9508e7aec1537c4b04a2bfacb4
enabler.c
Posted Jan 13, 2001
Authored by Norby | Site avatarcorp.org

Enabler.c attempts to find the enable password on a cisco system via brute force. Tested on Cisco 2600's and 12008's and has support for login-pass as well as login-only devices.

systems | cisco
SHA-256 | 6c9df24566f021f2620f2e21a1865e88c3f4961ebb5920182e11f1f413bbba6a
ncat-0.1.tar.gz
Posted Dec 7, 2000
Site ncat.sourceforge.net

ncat is a network config Audit Tool for IOS (and other) configs. ncat reads a master config file (default ./ncat.conf) and checks one or more config files specified on the command line against rules found in the master. Rules specify that a particular chunk of text is either required or forbidden. Once all rules have been checked, a report is output listing violations.

systems | cisco
SHA-256 | 85615dadc4ee83f8faf51ab4c2c37e71451176a055a158b811664ebd8e732dae
pixlog-1.0.tgz
Posted Jul 31, 2000
Authored by Matt Post | Site cs.calvin.edu

pixlog is a utility for compiling useful reports from the syslog messages of a Cisco PIX firewall. As tens of megabytes of data can be generated by a PIX firewall per minute, pixlog cooperates with syslogd to parse the data as it comes in, generating nice looking HTML reports. Screenshot available here.

systems | cisco
SHA-256 | 510acc5a8e898f3fb0a016c28fa59aa3b71d4864e00d1590b310bec215b46cb8
cisco.txt
Posted Jun 21, 2000
Authored by Brad Spengler

Enhancing network security through the use of inexpensive cisco routers. Describes local router security, turning off the routers services, access-lists, dos protection, and more.

tags | local
systems | cisco
SHA-256 | d03ff45dc98d26a5101627907163535a5bc7387cf4d3281a0eb76a95e6ecb9ad
CiscoAuditingTool-v1.tar.gz
Posted May 24, 2000
Authored by G0ne | Site scrypt.net

Cisco Auditing Tool - Perl script which scans cisco routers for common vulnerabilities. Checks for default passwords, easily guessable community names, and the IOS history bug. Includes support for plugins and scanning multiple hosts.

tags | perl, vulnerability
systems | cisco
SHA-256 | 83f0404b49b0651b5b06b1a0938a579429b8de76f749a2b92532493f0ecbdcfc
cisconuke.c
Posted May 23, 2000
Site hack.co.za

cisconuke.c reboots cisco routers which have the web-server interface open by sending invalid data to port 80.

tags | web
systems | cisco
SHA-256 | 331f4fdea18bb2834318576aef12a0dbaa6325ac46b29b1e080265dea8743c64
fuckcisco.c
Posted May 22, 2000

Remote cisco DoS attack.

tags | remote
systems | cisco
SHA-256 | b291d0215efe2342445151c41c0dd9e7584a458042e98e5c3e036023ac132214
ciscoDOS.c
Posted May 16, 2000
Authored by Tiz.Telesup

This is a denial of service attack against the Cisco 760 series router.

tags | denial of service
systems | cisco
SHA-256 | 7b539289067be68183f9e2ba49a7d42d2c60f672934f3a61c1dff757b84b6769
9x_c1sco.zip
Posted Aug 17, 1999
Authored by Bosplaya of 9x

Kills all Cisco 7xx routers running IOS/700 v4.1(x).

systems | cisco
SHA-256 | 2e8c9d5c5edc40381958eba572a511089ed9882663065c4f3a8c3527cce9f89b
Cisco-Conf-0.06.tar.gz
Posted Aug 17, 1999

Cisco::Conf - A module and utility for managing Cisco configurations via TFTP.

systems | cisco
SHA-256 | fb2d42e257281d74fbf213aaafcb25754265251cad0d409af0cdf5550734c01f
Cisco-Conf-0.08.tar.gz
Posted Aug 17, 1999

Cisco::Conf - A module and utility for managing Cisco configurations via TFTP.

systems | cisco
SHA-256 | 8ed85e78de7e7c1dc9630270a2ec42fcafd4002a1efc4a9fa1c8dfa2a6d561d1
cisco.7xx.passwd.buffer.overflow
Posted Aug 17, 1999

Cisco 7xx password buffer overflow; cause DoS and possible router access compromise.

tags | overflow
systems | cisco
SHA-256 | dd28820610fff1a56c8045da417537c1ec3151ff691bdea467bb3cecd3764cf5
cisco.c
Posted Aug 17, 1999
Authored by CyberPsychotic

Snippet of code that will tell you whether remote device is a cisco router or not using cisco's indent port (1999).

tags | remote
systems | cisco
SHA-256 | 803b1efba5379b868ba3f6a532adc90d032d52c4ee522f4cf8e64972693fed89
cisco.decrypt.palm_pilot.pw_1-0.zip
Posted Aug 17, 1999

Palm Pilot program used to decrypt Cisco passwd files.

systems | cisco
SHA-256 | 40cf5378981fec5bf418d7dc46d7ae415dbf3a9cac2b35068399b37a98555497
cisco.decrypt.tech.info.by.mudge.txt
Posted Aug 17, 1999

Decrypting Cisco passwds, info from Mudge.

systems | cisco
SHA-256 | fa60035a48dd1db65ce6906c8367212c4b0035a908ed6dc2b7a0a2be64c8c44c
cisco.pw.decrypt.opl
Posted Aug 17, 1999

Cisco passwd decryption code.

systems | cisco
SHA-256 | 05778602f3260b509e9563af901748212e7bd20195113a30a2e47dba38d011b7
ciscocrack.c
Posted Aug 17, 1999

Decrypts encrypted Cisco passwd files.

systems | cisco
SHA-256 | b4f889801b00a6f222d7eccb03c58f03c83c28314abb59703d20b9ec848eb186
ciscopix.txt
Posted Aug 17, 1999

CISCO PIX Vulnerability, cracking the 48 bit DES keys that Cisco routers use.

systems | cisco
SHA-256 | 2f4cbe13aa0ddb94abb357808c7d69b956be407527ae5ff10b87b5697461c40d
Page 3 of 3
Back123Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close