<head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<meta charset="utf-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1">
<title>kali工具箱</title>
<script src="./static/bootstrap.min.js"></script>
<link rel="stylesheet" href="./static/main.css">
<link rel="stylesheet" href="./static/bootstrap.min.css">
<style type="text/css" id="syntaxhighlighteranchor"></style>
</head>
<main class="main-container ng-scope" ng-view="">
<div class="main receptacle post-view ng-scope">
<article class="entry ng-scope" ng-controller="EntryCtrl" ui-lightbox="">
<section class="entry-content ng-binding" ng-bind-html="postContentTrustedHtml">
<section class="l-section"><div class="l-section-h i-cf"><h2>cisco-global-exploiter Package Description</h2>
<p style="text-align: justify;">Cisco Global Exploiter (CGE), is an advanced, simple and fast security testing tool.
</p><p>
<a href="http://www.blackangels.it" variation="deepblue" target="blank">cisco-global-exploiter Homepage</a> | <a href="http://git.kali.org/gitweb/?p=packages/cisco-global-exploiter.git;a=summary" variation="deepblue" target="blank">Kali cisco-global-exploiter Repo</a></p>
<ul>
<li>Author: Nemesis, E4m</li>
<li>License: GPLv2</li>
</ul>
<h3>Tools included in the cisco-global-exploiter package</h3>
<h5>cge.pl – Simple and fast security testing tool</h5>
<code><a class="__cf_email__" href="/cdn-cgi/l/email-protection" data-cfemail="097b66667d4962686560">[email&#160;protected]</a><script data-cfhash='f9e31' type="text/javascript">/* <![CDATA[ */!function(t,e,r,n,c,a,p){try{t=document.currentScript||function(){for(t=document.getElementsByTagName('script'),e=t.length;e--;)if(t[e].getAttribute('data-cfhash'))return t[e]}();if(t&&(c=t.previousSibling)){p=t.parentNode;if(a=c.getAttribute('data-cfemail')){for(e='',r='0x'+a.substr(0,2)|0,n=2;a.length-n;n+=2)e+='%'+('0'+('0x'+a.substr(n,2)^r).toString(16)).slice(-2);p.replaceChild(document.createTextNode(decodeURIComponent(e)),c)}p.removeChild(t)}}catch(u){}}()/* ]]> */</script>:~# cge.pl<br>
<br>
Usage :<br>
perl cge.pl &lt;target&gt; &lt;vulnerability number&gt;<br>
<br>
Vulnerabilities list :<br>
[1] - Cisco 677/678 Telnet Buffer Overflow Vulnerability<br>
[2] - Cisco IOS Router Denial of Service Vulnerability<br>
[3] - Cisco IOS HTTP Auth Vulnerability<br>
[4] - Cisco IOS HTTP Configuration Arbitrary Administrative Access Vulnerability<br>
[5] - Cisco Catalyst SSH Protocol Mismatch Denial of Service Vulnerability<br>
[6] - Cisco 675 Web Administration Denial of Service Vulnerability<br>
[7] - Cisco Catalyst 3500 XL Remote Arbitrary Command Vulnerability<br>
[8] - Cisco IOS Software HTTP Request Denial of Service Vulnerability<br>
[9] - Cisco 514 UDP Flood Denial of Service Vulnerability<br>
[10] - CiscoSecure ACS for Windows NT Server Denial of Service Vulnerability<br>
[11] - Cisco Catalyst Memory Leak Vulnerability<br>
[12] - Cisco CatOS CiscoView HTTP Server Buffer Overflow Vulnerability<br>
[13] - 0 Encoding IDS Bypass Vulnerability (UTF)<br>
[14] - Cisco IOS HTTP Denial of Service Vulnerability</code>
<h3>cisco-global-exploiter Usage Example</h3>
<p>Attack the target host <b><i>(192.168.99.230)</i></b> using the Cisco IOS HTTP Auth Vulnerability <b><i>(3)</i></b>:</p>
<code><a class="__cf_email__" href="/cdn-cgi/l/email-protection" data-cfemail="5d2f3232291d363c3134">[email&#160;protected]</a><script data-cfhash='f9e31' type="text/javascript">/* <![CDATA[ */!function(t,e,r,n,c,a,p){try{t=document.currentScript||function(){for(t=document.getElementsByTagName('script'),e=t.length;e--;)if(t[e].getAttribute('data-cfhash'))return t[e]}();if(t&&(c=t.previousSibling)){p=t.parentNode;if(a=c.getAttribute('data-cfemail')){for(e='',r='0x'+a.substr(0,2)|0,n=2;a.length-n;n+=2)e+='%'+('0'+('0x'+a.substr(n,2)^r).toString(16)).slice(-2);p.replaceChild(document.createTextNode(decodeURIComponent(e)),c)}p.removeChild(t)}}catch(u){}}()/* ]]> */</script>:~# cge.pl 192.168.99.230 3<br>
<br>
Vulnerability successful exploited with [http://192.168.99.230/level/17/exec/....] ...</code>
</div></section><div style="display:none">
<script src="//s11.cnzz.com/z_stat.php?id=1260038378&web_id=1260038378" language="JavaScript"></script>
</div>
</main></body></html>
