README for grml-sectools provided by grml (see grml.org).

################################################################################
ios-w3-vul

 Cisco IOS HTTP Server Vulnerability Scanner.
 Written by bashis <bash[at]wcd[dot]se>

 This code scanning a Cisco router/switch for vulnerability,
 and as an option fetching the configuration, without any
 authentication, of the router/switch if vulnerability is found.

 Vulnerable:
 Almost(?) ALL Cisco IOS based products with IOS Version later then 11.3,
 with HTTP server enabled and using no TACACS+ / Radius authentication.
 (I have been unable to reproduce this on routers/switches with IOS 11.2)

 Vendors advisory:
 http://www.cisco.com/warp/public/707/IOS-httplevel-pub.html

 Cisco Bug ID: CSCdt93862
################################################################################

################################################################################
anwrap.pl

anwrap is a wrapper for ancontrol that serves as a dictionary attack tool
against LEAP enabled Cisco Wireless Networks. It traverses a user list and
password list attempting authentication and logging the results to a file.

Brian Barto <brian@bartosoft.com> and Ron Sweeney <sween@modelm.org>
################################################################################

################################################################################
ccsat

 CCSAT                               Version 1.0
 Copyright 2003 Bill Zeng            bill.zeng@mbs.gov.on.ca
 Created: May 9, 2003                Last Modified: June 20, 2003
 Script Available at:                http://hotunix.com/tools/

 COPYRIGHT NOTICE
 Copyright (C) 2003  Bill Zeng   All Rights Reserved

 CCSAT (Cisco Configuration Security Auditing Tool) is a script to
 allow automated audit of configuration security of large numbers
 of Cisco routers and switches.  The tool is based upon industry
 best practices including Cisco, NSA and SANS security guides and
 recommendations.  It is flexible and can report details down to
 individual device interfaces, lines, ACL's, AS's, etc.

 Special thanks go to Tim Dafoe and Jamie Reid for sharing their
 knowledge and resources with the author.  The script has been
 test-run on FreeBSD, Linux and Solaris 8, and should work on all
 major UNIX platforms (POSIX.2-compliant).
################################################################################

smbnuke.c: http://packetstorm.linuxsecurity.com/DoS/smbnuke.c

Metasploit Framework: http://www.metasploit.com/projects/Framework/

encoder: http://www.klake.org/~jt/encoder/

alpha2: http://www.edup.tudelft.nl/~bjwever/alpha2.php

cge13: http://packetstormsecurity.nl/0405-exploits/cge-13.tar.gz

55hb.sh: http://packetstormsecurity.org/Crackers/55hb.sh
55hb_v1.sh: http://www.packetstormsecurity.org/Crackers/55hb_v1.sh.txt
