---
title: cisco-torch
categories: Vulnerability Analysis
tags: [vulnerability analysis,kali linux,exploitation tools,cdpsnarf,information gathering]
date: 2016-10-19 14:11:46
---
0x00 cisco-torch介绍
-------------
Cisco Torch是集大规模扫描,指纹识别和利用工具的下一代“黑掉暴露的思科网络”工具,开发它的原因是上市场上提供的工具不能满足我们的需要。
Cisco-torch与类似工具不同的主要特性是大量启动多个后台扫描进程,以实现最高的扫描效率。此外,如果需要,它可以同时使用几种应用程序层指纹的方法。我们k'yi快速发现运行Telnet,SSH,Web,NTP和SNMP服务的远程思科主机,并针对发现的服务启动字典攻击。
工具来源:https://github.com/Zapotek/cdpsnarf
[cisco-torch主页][1] | [Kali cisco-torch Repo仓库][2]
- 作者:Born by Arhont Team
- 证书:LGPL-2.1
0x01 cisco-torch功能
---------------
cisco-torch - 思科设备扫描器
```shell
root@kali:~# cisco-torch
sing配置文件torch.conf ...
正在载入include和plugin ...
用法:cisco-torch <选项> <IP地址,主机名,网络段>
或:cisco-torch <选项> -F <主机列表文件>
可用选项:
-O <输出文件>
-A 组合所有指纹扫描类型
-t 思科Telnetd扫描
-s 思科SSHd扫描
-u 思科SNMP扫描
-g Cisco配置或tftp文件下载
-n NTP指纹扫描
-j TFTP指纹扫描
-l <type> 日志记录层次
c 关键摘要模式(默认)
v 详细模式
d 调试模式
-w 思科Web服务器扫描
-z 思科IOS HTTP授权漏洞扫描
-c 扫描支持SSL思科Web服务器
-b 密码字典攻击(仅与-s,-u,-c,-w,-j或-t一起使用)
-V 打印版本信息并退出
示例:
cisco-torch -A 10.10.0.0/16
cisco-torch -s -b -F sshtocheck.txt
cisco-torch -w -z 10.10.0.0/16
cisco-torch -j -b -g -F tftptocheck.txt
```
0x02 cisco-torch用法示例
-----------------
运行所有可用的扫描类型(-A)针对目标IP地址(192.168.99.202):
```shell
root@kali:~# cisco-torch -A 192.168.99.202
Using config file torch.conf...
Loading include and plugin ...
###############################################################
# Cisco Torch Mass Scanner #
# Becase we need it... #
# http://www.arhont.com/cisco-torch.pl #
###############################################################
List of targets contains 1 host(s)
8853: Checking 192.168.99.202 ...
HUH db not found, it should be in fingerprint.db
Skipping Telnet fingerprint
* Cisco by SNMP found ***
*System Description: Cisco Internetwork Operating System Software
IOS (tm) 3600 Software (C3640-IK9O3S-M), Version 12.3(22), RELEASE SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2007 by cisco Systems, Inc.
Compiled Wed 24-Jan-07 1
Cisco-IOS Webserver found
HTTP/1.1 401 Unauthorized
Date: Tue, 13 Apr 1993 00:57:07 GMT
Server: cisco-IOS
Accept-Ranges: none
WWW-Authenticate: Basic realm="level_15_access"
401 Unauthorized
Cisco WWW-Authenticate webserver found
HTTP/1.1 401 Unauthorized
Date: Tue, 13 Apr 1993 00:57:07 GMT
Server: cisco-IOS
Accept-Ranges: none
WWW-Authenticate: Basic realm="level_15_access"
401 Unauthorized
--->
- All scans done. Cisco Torch Mass Scanner -
---> Exiting.
```
[1]: http://www.hackingciscoexposed.com/?link=tools
[2]: http://git.kali.org/gitweb/?p=packages/cisco-torch.git;a=summary%22
- Information Gathering
- acccheck
- ace-voip
- Amap
- Automater
- bing-ip2hosts
- braa
- CaseFile
- CDPSnarf
- cisco-torch
- Cookie Cadger
- copy-router-config
- DMitry
- dnmap
- dnsenum
- dnsmap
- DNSRecon
- dnstracer
- dnswalk
- DotDotPwn
- enum4linux
- enumIAX
- Fierce
- Firewalk
- fragroute
- fragrouter
- Ghost Phisher
- GoLismero
- goofile
- hping3
- InTrace
- iSMTP
- lbd
- Maltego Teeth
- masscan
- Metagoofil
- Miranda
- nbtscan-unixwiz
- Nmap
- ntop
- p0f
- Parsero
- Recon-ng
- SET
- smtp-user-enum
- snmp-check
- sslcaudit
- SSLsplit
- sslstrip
- SSLyze
- THC-IPV6
- theHarvester
- TLSSLed
- twofi
- URLCrazy
- Wireshark
- WOL-E
- Xplico
- Vulnerability Analysis
- BBQSQL
- BED
- cisco-auditing-tool
- cisco-global-exploiter
- cisco-ocs
- cisco-torch
- copy-router-config
- Doona
- Exploitation Tools
- Wireless Attacks
- Ghost-Phisher
- mfoc
- Forensics Tools
- Binwalk
- bulk-extractor
- Web Applications
- apache-users
- BurpSuite
- sqlmap
- w3af
- Sniffing-Spoofing
- Bettercap
- Burp Suite
- DNSChef
- Fiked
- hamster-sidejack
- HexInject
- Password Attacks
- crunch
- hashcat
- John the Ripper
- Johnny
- Hardware Hacking
- android-sdk
- apktool
- Arduino
- dex2jar
- Sakis3G
- Reverse Engineering
- apktool