Penetration Testing mailing list archives

[PEN-TEST] Network Access Device Scanning


From: "Teicher, Mark" <mark.teicher () NETWORKICE COM>
Date: Fri, 8 Sep 2000 11:09:34 -0700

Ok,

A follow up post, What I am looking for is something that does that
provides the following information:

Network Access Device Scan Results:


Cisco Internetwork Operating System Software IOS (tm) 2500 Software
(C2500-IS56-L)
Version 11.2(8), RELEASE SOFTWARE (fc1) Copyright (c) 1986-1997 by cisco
Systems, Inc.
Compiled Tue 05-Aug-97 09:07 by ckralik
Image text-base: 0x00001448, data-base: 0x00561104
ROM: System Bootstrap, Version 4.14(9.1), SOFTWARE
ironlung uptime is 2 weeks, 13 hours, 19 minutes
System restarted by power-on
System image file is "c2500-is56-l.112-8.Z", booted via flash
cisco 2500 (68030) processor (revision D) with 16384K/2048K bytes of memory.
Processor board ID 01560898, with hardware revision 00000000

Or in CSV format..

"ras-11.domain.net","126.179.204.191","noc","ras.domain.net",1.3.6.1.4.1.9.1.188,"311740070","","Cisco
Internetwork Operating System Software \n\nIOS (tm) 5800 Software
(C5800-P4-M), Version 11.3(10.6)AA, EARLY DEPLOYMENT MAINTENANCE INTERIM
SOFTWARE\n\nCopyright (c) 1986-1999 by cisco Systems, Inc.\n\nCompiled Fri
22-Oct-99 00:17 by sharpd"


Then it would have some counters in order to provide a count of x number of
RAS/NAS devices, then collect some information based on the discovery to
apply security recommendations to

/m


Current thread: