---
title: cisco-torch
categories: Vulnerability Analysis
tags: [vulnerability analysis,kali linux,exploitation tools,cdpsnarf,information gathering]
date: 2016-10-19 14:11:46
---
0x00 cisco-torch介紹
-------------
Cisco Torch是集大規模掃描,指紋識別和利用工具的下一代“黑掉暴露的思科網絡”工具,開發它的原因是上市場上提供的工具不能滿足我們的需要。
Cisco-torch與類似工具不同的主要特性是大量啟動多個后臺掃描進程,以實現最高的掃描效率。此外,如果需要,它可以同時使用幾種應用程序層指紋的方法。我們k'yi快速發現運行Telnet,SSH,Web,NTP和SNMP服務的遠程思科主機,并針對發現的服務啟動字典攻擊。
工具來源:https://github.com/Zapotek/cdpsnarf
[cisco-torch主頁][1] | [Kali cisco-torch Repo倉庫][2]
- 作者:Born by Arhont Team
- 證書:LGPL-2.1
0x01 cisco-torch功能
---------------
cisco-torch - 思科設備掃描器
```shell
root@kali:~# cisco-torch
sing配置文件torch.conf ...
正在載入include和plugin ...
用法:cisco-torch <選項> <IP地址,主機名,網絡段>
或:cisco-torch <選項> -F <主機列表文件>
可用選項:
-O <輸出文件>
-A 組合所有指紋掃描類型
-t 思科Telnetd掃描
-s 思科SSHd掃描
-u 思科SNMP掃描
-g Cisco配置或tftp文件下載
-n NTP指紋掃描
-j TFTP指紋掃描
-l <type> 日志記錄層次
c 關鍵摘要模式(默認)
v 詳細模式
d 調試模式
-w 思科Web服務器掃描
-z 思科IOS HTTP授權漏洞掃描
-c 掃描支持SSL思科Web服務器
-b 密碼字典攻擊(僅與-s,-u,-c,-w,-j或-t一起使用)
-V 打印版本信息并退出
示例:
cisco-torch -A 10.10.0.0/16
cisco-torch -s -b -F sshtocheck.txt
cisco-torch -w -z 10.10.0.0/16
cisco-torch -j -b -g -F tftptocheck.txt
```
0x02 cisco-torch用法示例
-----------------
運行所有可用的掃描類型(-A)針對目標IP地址(192.168.99.202):
```shell
root@kali:~# cisco-torch -A 192.168.99.202
Using config file torch.conf...
Loading include and plugin ...
###############################################################
# Cisco Torch Mass Scanner #
# Becase we need it... #
# http://www.arhont.com/cisco-torch.pl #
###############################################################
List of targets contains 1 host(s)
8853: Checking 192.168.99.202 ...
HUH db not found, it should be in fingerprint.db
Skipping Telnet fingerprint
* Cisco by SNMP found ***
*System Description: Cisco Internetwork Operating System Software
IOS (tm) 3600 Software (C3640-IK9O3S-M), Version 12.3(22), RELEASE SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2007 by cisco Systems, Inc.
Compiled Wed 24-Jan-07 1
Cisco-IOS Webserver found
HTTP/1.1 401 Unauthorized
Date: Tue, 13 Apr 1993 00:57:07 GMT
Server: cisco-IOS
Accept-Ranges: none
WWW-Authenticate: Basic realm="level_15_access"
401 Unauthorized
Cisco WWW-Authenticate webserver found
HTTP/1.1 401 Unauthorized
Date: Tue, 13 Apr 1993 00:57:07 GMT
Server: cisco-IOS
Accept-Ranges: none
WWW-Authenticate: Basic realm="level_15_access"
401 Unauthorized
--->
- All scans done. Cisco Torch Mass Scanner -
---> Exiting.
```
[1]: http://www.hackingciscoexposed.com/?link=tools
[2]: http://git.kali.org/gitweb/?p=packages/cisco-torch.git;a=summary%22
- Information Gathering
- acccheck
- ace-voip
- Amap
- Automater
- bing-ip2hosts
- braa
- CaseFile
- CDPSnarf
- cisco-torch
- Cookie Cadger
- copy-router-config
- DMitry
- dnmap
- dnsenum
- dnsmap
- DNSRecon
- dnstracer
- dnswalk
- DotDotPwn
- enum4linux
- enumIAX
- Fierce
- Firewalk
- fragroute
- fragrouter
- Ghost Phisher
- GoLismero
- goofile
- hping3
- InTrace
- iSMTP
- lbd
- Maltego Teeth
- masscan
- Metagoofil
- Miranda
- nbtscan-unixwiz
- Nmap
- ntop
- p0f
- Parsero
- Recon-ng
- SET
- smtp-user-enum
- snmp-check
- sslcaudit
- SSLsplit
- sslstrip
- SSLyze
- THC-IPV6
- theHarvester
- TLSSLed
- twofi
- URLCrazy
- Wireshark
- WOL-E
- Xplico
- Vulnerability Analysis
- BBQSQL
- BED
- cisco-auditing-tool
- cisco-global-exploiter
- cisco-ocs
- cisco-torch
- copy-router-config
- Doona
- Exploitation Tools
- Wireless Attacks
- Ghost-Phisher
- mfoc
- Forensics Tools
- Binwalk
- bulk-extractor
- Web Applications
- apache-users
- BurpSuite
- sqlmap
- w3af
- Sniffing-Spoofing
- Bettercap
- Burp Suite
- DNSChef
- Fiked
- hamster-sidejack
- HexInject
- Password Attacks
- crunch
- hashcat
- John the Ripper
- Johnny
- Hardware Hacking
- android-sdk
- apktool
- Arduino
- dex2jar
- Sakis3G
- Reverse Engineering
- apktool