Cisco ASA Software 8.x/9.x – IKEv1 / IKEv2 Buffer Overflow

Viewing 0 reply threads
  • Author
    • #174308


      I’m kind of new to Python and to pentesting.
      While working on a client case, I found that there’s a Cisco ASA, which is running a version which may be vulnerable to this exploit.

      I downloaded the exploit, but I need to understand how it works, as I’m new to Python as well, and I’m not understanding what parameters should I add to the exploit in order to run it.
      Anyone can help understand which parameters should I pass to run the exploit?
      Also, seems the exploit is trying to get a reserve bash session, but for that I need to have a listener on my side right?


Viewing 0 reply threads
  • You must be logged in to reply to this topic.

Copyright ©2020 Caendra, Inc.

Contact Us

Thoughts, suggestions, issues? Send us an email, and we'll get back to you.


Sign in with Caendra

Forgot password?Sign up

Forgot your details?