---
title: copy-router-config
categories: Vulnerability Analysis
tags: [copy-router-config,snmp,kali linux,vulnanalysis,information gathering,networking]
date: 2016-10-19 22:00:00
---
0x00 copy-router-config介紹
-------------
從運行SNMP的思科設備復制配置文件
工具來源:braa README
[copy-router-config主頁][1] | [Kali copy-router-config Repo倉庫][2]
- 作者:muts
- 證書:GPLv2
0x01 copy-router-config功能
---------------
copy-router-config.pl - 通過SNMP協議復制Cisco配置
```shell
root@kali:~# copy-router-config.pl
######################################################
# Copy Cisco Router config - Using SNMP
# Hacked up by muts - muts@offensive-security.com
#######################################################
用法 : ./copy-copy-config.pl <路由IP> <tftp服務器IP> <社區字符串>
確保TFTP服務器已設置,最好從/tmp運行!
```
注:社區字符串(community string)是一個用在基于簡單網絡管理協議(SNMP)的管理系統的概念,是一個起著密碼作用的文本串,其被用來鑒別在管理站點和一個包含SNMP信息的代理的路由器之間的信息發送。并將被發送到在管理器和代理之間的每個數據包。
0x02 merge-router-config功能
--------------------------
merge-router-config.pl - 通過SNMP協議合并Cisco配置
```shell
root@kali:~# merge-router-config.pl
######################################################
# Merge Cisco Router config - Using SNMP
# Hacked up by muts - muts@offensive-security.com
#######################################################
用法 : ./merge-copy-config.pl <路由IP> <tftp服務器IP> <社區字符串>
確保TFTP服務器已設置,最好從/tmp運行!
```
0x03 copy-router-config用法示例
-----------------
將配置從路由器(192.168.1.1)復制到TFTP服務器(192.168.1.15),使用社區字符串(private)進行認證:
```shell
root@kali:~# copy-router-config.pl 192.168.1.1 192.168.1.15 private
```
0x04 merge-router-config用法示例
-----------------
將配置從路由器(192.168.1.1)合并到TFTP服務器(192.168.1.15),使用社區字符串(private):
```shell
root@kali:~# merge-router-config.pl 192.168.1.1 192.168.1.15 private
```
[1]: http://www.offensive-security.com/
[2]: http://git.kali.org/gitweb/?p=packages/copy-router-config.git;a=summary
- Information Gathering
- acccheck
- ace-voip
- Amap
- Automater
- bing-ip2hosts
- braa
- CaseFile
- CDPSnarf
- cisco-torch
- Cookie Cadger
- copy-router-config
- DMitry
- dnmap
- dnsenum
- dnsmap
- DNSRecon
- dnstracer
- dnswalk
- DotDotPwn
- enum4linux
- enumIAX
- Fierce
- Firewalk
- fragroute
- fragrouter
- Ghost Phisher
- GoLismero
- goofile
- hping3
- InTrace
- iSMTP
- lbd
- Maltego Teeth
- masscan
- Metagoofil
- Miranda
- nbtscan-unixwiz
- Nmap
- ntop
- p0f
- Parsero
- Recon-ng
- SET
- smtp-user-enum
- snmp-check
- sslcaudit
- SSLsplit
- sslstrip
- SSLyze
- THC-IPV6
- theHarvester
- TLSSLed
- twofi
- URLCrazy
- Wireshark
- WOL-E
- Xplico
- Vulnerability Analysis
- BBQSQL
- BED
- cisco-auditing-tool
- cisco-global-exploiter
- cisco-ocs
- cisco-torch
- copy-router-config
- Doona
- Exploitation Tools
- Wireless Attacks
- Ghost-Phisher
- mfoc
- Forensics Tools
- Binwalk
- bulk-extractor
- Web Applications
- apache-users
- BurpSuite
- sqlmap
- w3af
- Sniffing-Spoofing
- Bettercap
- Burp Suite
- DNSChef
- Fiked
- hamster-sidejack
- HexInject
- Password Attacks
- crunch
- hashcat
- John the Ripper
- Johnny
- Hardware Hacking
- android-sdk
- apktool
- Arduino
- dex2jar
- Sakis3G
- Reverse Engineering
- apktool