Tool Documentation:
cisco-auditing-tool Usage Example
Scan the host (-h 192.168.99.230
) on port 23 (-p 23
), using a password dictionary file (-a /usr/share/wordlists/nmap.lst
):
root@kali:~# CAT -h 192.168.99.230 -p 23 -a /usr/share/wordlists/nmap.lst
Cisco Auditing Tool - g0ne [null0]
Checking Host: 192.168.99.230
Guessing passwords:
Invalid Password: 123456
Invalid Password: 12345
Packages and Binaries:
cisco-auditing-tool
Perl script which scans cisco routers for common vulnerabilities.
Installed size: 266 KB
How to install: sudo apt install cisco-auditing-tool
Dependencies:
- perl
CAT
Concatenate files and print on the standard output
root@kali:~# CAT --help
/usr/bin/CAT version [unknown] calling Getopt::Std::getopts (version 1.14 [paranoid]),
running under Perl version 5.40.0.
Usage: CAT [-OPTIONS [-MORE_OPTIONS]] [--] [PROGRAM_ARG1 ...]
The following single-character options are accepted:
With arguments: -h -f -p -w -a -l
Boolean (without arguments): -i -q
Options may be merged together. -- stops processing of options.
Space is not required between options and their arguments.
[Now continuing due to backward compatibility and excessive paranoia.
See 'perldoc Getopt::Std' about $Getopt::Std::STANDARD_HELP_VERSION.]
Updated on: 2024-Nov-17