Vul Analysis / Cisco

Filling in files
This commit is contained in:
Will Pennell 2014-03-30 19:24:50 -04:00
parent 2934e6dab9
commit fbd6eb9b4e
2 changed files with 64 additions and 0 deletions

35
tools/cge.pl.md Normal file
View File

@ -0,0 +1,35 @@
# cge.pl - Cisco-Global-exploiter
Notes
-------
Help Text
-------
```
Usage :
perl cge.pl <target> <vulnerability number>
Vulnerabilities list :
[1] - Cisco 677/678 Telnet Buffer Overflow Vulnerability
[2] - Cisco IOS Router Denial of Service Vulnerability
[3] - Cisco IOS HTTP Auth Vulnerability
[4] - Cisco IOS HTTP Configuration Arbitrary Administrative Access Vulnerability
[5] - Cisco Catalyst SSH Protocol Mismatch Denial of Service Vulnerability
[6] - Cisco 675 Web Administration Denial of Service Vulnerability
[7] - Cisco Catalyst 3500 XL Remote Arbitrary Command Vulnerability
[8] - Cisco IOS Software HTTP Request Denial of Service Vulnerability
[9] - Cisco 514 UDP Flood Denial of Service Vulnerability
[10] - CiscoSecure ACS for Windows NT Server Denial of Service Vulnerability
[11] - Cisco Catalyst Memory Leak Vulnerability
[12] - Cisco CatOS CiscoView HTTP Server Buffer Overflow Vulnerability
[13] - 0 Encoding IDS Bypass Vulnerability (UTF)
[14] - Cisco IOS HTTP Denial of Service Vulnerability
```
Example Usage
-------
Links
-------

29
tools/ocs.md Normal file
View File

@ -0,0 +1,29 @@
# osc - cisco-ocs
Notes
-------
Help Text
-------
```
********************************* OCS v 0.1 **********************************
**** ****
**** coded by OverIP ****
**** ****
**** under GPL License ****
**** ****
**** usage: ./ocs xxx.xxx.xxx.xxx yyy.yyy.yyy.yyy ****
**** ****
**** xxx.xxx.xxx.xxx = range start IP ****
**** yyy.yyy.yyy.yyy = range end IP ****
**** ****
******************************************************************************
uso: ocs IP IP
```
Example Usage
-------
Links
-------