Summary: | [new port]: security/cisco-torch Mass Cisco Vulnerability Scanner | ||||||||
---|---|---|---|---|---|---|---|---|---|
Product: | Ports & Packages | Reporter: | Rihaz Jerrin <rihaz.jerrin> | ||||||
Component: | Individual Port(s) | Assignee: | freebsd-ports-bugs (Nobody) <ports-bugs> | ||||||
Status: | Closed FIXED | ||||||||
Severity: | Affects Only Me | CC: | feld, rihaz.jerrin | ||||||
Priority: | --- | ||||||||
Version: | Latest | ||||||||
Hardware: | Any | ||||||||
OS: | Any | ||||||||
Attachments: |
|
Created attachment 167077 [details]
Shar file : security/cisco-torch
Committed with minor changes, thanks! A commit references this bug: Author: feld Date: Mon Mar 14 21:56:06 UTC 2016 New revision: 411122 URL: https://svnweb.freebsd.org/changeset/ports/411122 Log: Cisco-torch is a mass Cisco Vulnerability Scanner. The main feature that makes Cisco-torch different from similar tools is the extensive use of forking to launch multiple scanning processes on the background for maximum scanning efficiency. Also, it uses several methods of application layer fingerprinting simultaneously, if needed. We wanted something fast to discover remote Cisco hosts running Telnet, SSH, Web, NTP and SNMP services and launch dictionary attacks against the services discovered. WWW: http://www.hackingciscoexposed.com/?link=tools PR: 207221 Submitted by: Rihaz Jerrin <rihaz.jerrin@gmail.com> Changes: head/security/Makefile head/security/cisco-torch/ head/security/cisco-torch/Makefile head/security/cisco-torch/distinfo head/security/cisco-torch/files/ head/security/cisco-torch/files/patch-cisco-torch.pl head/security/cisco-torch/files/patch-include_Banner.pm head/security/cisco-torch/files/patch-torch.conf head/security/cisco-torch/pkg-descr head/security/cisco-torch/pkg-plist |
Created attachment 167040 [details] port file for security/cisco-torch Cisco-torch is a mass Cisco Vulnerability Scanner. The main feature that makes Cisco-torch different from similar tools is the extensive use of forking to launch multiple scanning processes on the background for maximum scanning efficiency. Also, it uses several methods of application layer fingerprinting simultaneously, if needed. We wanted something fast to discover remote Cisco hosts running Telnet, SSH, Web, NTP and SNMP services and launch dictionary attacks against the services discovered.