Home page logo
/

pen-test logo Penetration Testing mailing list archives

Re: [PEN-TEST] ios/cisco packet sniffer...
From: "Teicher, Mark" <mark.teicher () NETWORKICE COM>
Date: Mon, 27 Nov 2000 17:46:05 +0100

Solarwinds also has TYPE 7 password decryptor and a little diff
routine.  Still it is a far cry from
http://www.shrubbery.net/rancid/

At 10:25 AM 11/27/00 -0500, Beauregard, Claude Q wrote:
You may also want to look at a tool called Solarwinds. It's great for
obtaining the encrypted password for router access. It also has a config
viewer for extracting the running config from a router. - Nice tool -

http://www.solarwinds.net

-----Original Message-----
From: Penetration Testers [mailto:PEN-TEST () SECURITYFOCUS COM]On Behalf
Of Joe Hacker
Sent: Friday, November 24, 2000 3:59 PM
To: PEN-TEST () SECURITYFOCUS COM
Subject: Re: [PEN-TEST] ios/cisco packet sniffer...


I couldn't see this in the thread, only a bunch of links to various pages,
and since I
am off-line at the moment (and probably WAAAY behind reading this...), I
leave it
to the moderator to approve the post.

One good way to do a packet dump on a Cisco is:

        router(config)#access-list 199 permit ip <source> <mask>
<destination> <mask>
        router(config)#access-list 199 permit ip <destination> <mask>
<source> <mask>
        router(config)#end
        router# debug ip packet 199 dump

E.g.

        access-list 199 permit ip host 192.168.0.1 any
        access-list 199 permit ip any host 192.168.0.1

Will dump packets destined to and from 192.168.0.1.

I included the list, since debugging at packet level can cause the router
to reload if there is a lot
of traffic.

-j0e


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault