I’m kind of new to Python and to pentesting.
While working on a client case, I found that there’s a Cisco ASA, which is running a version which may be vulnerable to this exploit. https://www.exploit-db.com/exploits/39823
I downloaded the exploit, but I need to understand how it works, as I’m new to Python as well, and I’m not understanding what parameters should I add to the exploit in order to run it.
Anyone can help understand which parameters should I pass to run the exploit?
Also, seems the exploit is trying to get a reserve bash session, but for that I need to have a listener on my side right?