Recently I wrote an article on cisco-ocs from Backtrack Linux and provided examples of what it did as well as a bug where if a higher privilege was provided to the vty ports it would note the router was not vulnerable. In that scenario the router was even more vulnerable because the initial login provides enable privileges. Anyhow fast forward five days and the developer, known by OverIP, reached out to me to get more details so he could fix the bug and discuss expanding Cisco OCS’s capabilities. I am happy to announce Cisco OCS version 0.2 which fixes the bug mentioned in the previous article. More details are provided below as well as information about possible future releases.
The cisco-ocs application available in the Backtrack menu ( Backtrack > Vulnerability Assessment > Network Assessment > Cisco Tools ) is also known as cisco-ocs Mass Scanner. This tool provides a single function which is to scan large ranges of IP’s looking for Cisco devices or really any device listening on TCP port 23, attempts to login using telnet with a password of cisco, then passes the enable command to the Cisco router if its able to login via telnet, uses cisco again for the enable password, and finally reports a success if its able to get to the enable prompt using these exact steps. Unfortunately this is the only function of the tool as you cannot specify a wordlist of passwords to attempt or for that matter you cannot set anything accept for the range of IP addresses to scan. Below we should a couple examples of the Cisco-OCS Mass Scanner working on Backtrack 5 R3.
When using the cisco-auditing-tool script located in the Backtrack Linux menu ( Backtrack > Vulnerability Assessment > Network Assessment > Cisco Tools ) I was getting an error even though I was sure one of the passwords I had in the wordlist was accurate. After some troubleshooting I was able to figure out that the script checked for a non-privileged account on the Cisco device but if the account was actually a privileged account which is also known as an enable account it would crash because it never received the response it expected. I added a couple lines of code and now the cisco-auditing-tool Perl script will provide confirmation of lower level accounts on a Cisco device as well as enable level accounts on a Cisco device. Below I describe the error message output when the cisco-auditing-tool Perl script was crashing followed by the code update to provide Cisco enable level password auditing.
We have a site that does automated tasks using GPU processing however at times we use the GPU processing for other tasks which requires us to disable access to the public. The easiest way to do this is to install a WordPress maintenance mode type plugin that will allow you to easily disable access to the public but not require much work. Having a site in maintenance mode is also beneficial for any major site changes that may prevent a bad customer experience when visiting your WP site. Below are instructions on installing the WP Maintenance Mode plugin as well as information on putting your site in maintenance mode and bringing it out of maintenance mode.
When I first got my Dell Studio XPS laptop I would get a popup asking for me to specify what was being inserted into the audio jack. At some point I must have reconfigured this and forgotten exactly how I did so though I did remember that it was something to do with reconfiguration pop-ups. After searching around I finally found where you can enable or disable the Audio Jack Reconfiguration Pop-Ups on Windows 7. Follow the directions below to enable the reconfiguration popup on Windows 7 with the IDT software installed.