CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutSign UpSign In
rapid7

Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.

GitHub Repository: rapid7/metasploit-framework
Path: blob/master/documentation/modules/auxiliary/admin/networking/cisco_config.md
Views: 11788

Vulnerable Application

General Notes

This module imports a Cisco configuration file into the database. This is similar to post/networking/gather/enum_cisco only access isn't required, and assumes you already have the file.

Example files for import can be found on git, like this or from Cisco.

Verification Steps

  1. Have a Cisco configuration file

  2. Start msfconsole

  3. use auxiliary/admin/networking/cisco_config

  4. set RHOST x.x.x.x

  5. set CONFIG /tmp/file.config

  6. run

Options

RHOST

Needed for setting services and items to. This is relatively arbitrary.

CONFIG

File path to the configuration file.

Scenarios

root@metasploit-dev:~/metasploit-framework# wget https://raw.githubusercontent.com/GaetanLongree/MASI-ProjetAvanceReseau/3cf1d9a93828d5f44ee1bc4e4c01411e416892c5/Los%20Angeles/LA_EDGE_D.txt -O /tmp/LA_EDGE_D.txt -o /dev/null root@metasploit-dev:~/metasploit-framework# ./msfconsole [*] Starting persistent handler(s)... msf5 > use auxiliary/admin/networking/cisco_config msf5 auxiliary(admin/networking/cisco_config) > set config /tmp/LA_EDGE_D.txt config => /tmp/LA_EDGE_D.txt msf5 auxiliary(admin/networking/cisco_config) > set rhost 127.0.0.1 rhost => 127.0.0.1 msf5 auxiliary(admin/networking/cisco_config) > run [*] Running module against 127.0.0.1 [*] Importing config [+] 127.0.0.1:22 MD5 Encrypted Enable Password: $1$mERr$DWwx4W/5HXD2oail62IeB1 [+] 127.0.0.1:22 Username 'Waldo' with MD5 Encrypted Password: $1$mERr$DWwx4W/5HXD2oail62IeB1 [+] Config import successful [*] Auxiliary module execution completed