• Other Devices
  • | Chapter 5: Automated Exploits




    Download 22,59 Mb.
    Pdf ko'rish
    bet143/225
    Sana14.05.2024
    Hajmi22,59 Mb.
    #232856
    1   ...   139   140   141   142   143   144   145   146   ...   225
    Bog'liq
    learningkalilinux

    152 | Chapter 5: Automated Exploits


    Another program that is more directly used for exploitation is the Cisco Global
    Exploiter (CGE) program. This Perl script can be used to launch known attacks
    against targets. The script doesn’t randomly attempt attacks, and it’s also not there to
    create new attacks. 
    cge.pl
    has 14 attacks that will accomplish different outcomes.
    There are also some denial-of-service attacks. A denial-of-service attack will prevent
    the Cisco devices from functioning properly. Some of them are focused on manage‐
    ment protocols like Telnet or SSH. Other vulnerabilities may allow for remote code
    execution. 
    Example 5-2
     shows the list of vulnerabilities that 
    cge.pl
    supports. The man‐
    agement denial-of-service attacks will prevent management traffic from getting to the
    device but won’t typically impair the core functionality of the device.
    Example 5-2. Exploits available in cge.pl
    root@yazpistachio:~# cge.pl
    Usage :
    perl cge.pl
    Vulnerabilities list :
    [
    1
    ]
    - Cisco 677/678 Telnet Buffer Overflow Vulnerability
    [
    2
    ]
    - Cisco IOS Router Denial of Service Vulnerability
    [
    3
    ]
    - Cisco IOS HTTP Auth Vulnerability
    [
    4
    ]
    - Cisco IOS HTTP Configuration Arbitrary Administrative Access Vulnerability
    [
    5
    ]
    - Cisco Catalyst SSH Protocol Mismatch Denial of Service Vulnerability
    [
    6
    ]
    - Cisco 
    675
    Web Administration Denial of Service Vulnerability
    [
    7
    ]
    - Cisco Catalyst 
    3500
    XL Remote Arbitrary Command Vulnerability
    [
    8
    ]
    - Cisco IOS Software HTTP Request Denial of Service Vulnerability
    [
    9
    ]
    - Cisco 
    514
    UDP Flood Denial of Service Vulnerability
    [
    10
    ]
    - CiscoSecure ACS 
    for
    Windows NT Server Denial of Service Vulnerability
    [
    11
    ]
    - Cisco Catalyst Memory Leak Vulnerability
    [
    12
    ]
    - Cisco CatOS CiscoView HTTP Server Buffer Overflow Vulnerability
    [
    13
    ]

    0
    Encoding IDS Bypass Vulnerability 
    (
    UTF
    )
    [
    14
    ]
    - Cisco IOS HTTP Denial of Service Vulnerability
    Other Devices
    One utility to look at closely if you looking at smaller organizations is 
    routersploit
    .
    This program is a framework, taking the approach that additional modules can be
    developed and added to the framework to continue to extend the functionality. 
    rou‐
    tersploit
    has exploits for some Cisco devices but also smaller devices like 3COM, Bel‐
    kin, DLink, Huawei, and others. At the time of this writing, 
    routersploit
    has 84
    modules available for use. Not all of them are targeted at specific devices or vulnera‐
    bilities. Some of the modules are credential attacks, allowing for brute-forcing of pro‐
    tocols like SSH, Telnet, HTTP, and others. 
    Example 5-3
    shows the use of one of the
    brute-force modules. To get into the interface shown, we run 
    routersploit
    from the
    command line.

    Download 22,59 Mb.
    1   ...   139   140   141   142   143   144   145   146   ...   225




    Download 22,59 Mb.
    Pdf ko'rish