Forum Thread: Cisco ASA Software 8.X/9.X - IKEv1 / IKEv2 Buffer Overflow


I'm kind of new to Python and to pentesting.

While working on a client case, I found that there's a Cisco ASA, which is running a version which may be vulnerable to this exploit.

I downloaded the exploit, but I need to understand how it works, as I'm new to Python as well, and I'm not understanding what parameters should I add to the exploit in order to run it.

Anyone can help understand which parameters should I pass to run the exploit?

Also, seems the exploit is trying to get a reserve bash session, but for that I need to have a listener on my side right?


Be the First to Respond

Share Your Thoughts

  • Hot
  • Active