## https://sploitus.com/exploit?id=9B0E0A22-7179-5FF7-89A8-2DCC6634F7C4
# Cisco Tester: Vulnerability Detection Script
## Table of Contents
- [Overview](#overview)
- [Features](#features)
- [Prerequisites](#prerequisites)
- [Installation](#installation)
- [Usage](#usage)
- [Output](#output)
- [Contributing](#contributing)
## Overview
The `cisco_tester.py` script is designed to assess multiple IP addresses for a specific Cisco vulnerability (CVE-2023-20198). It performs an HTTP or HTTPS POST request to each IP and checks for a specific string in the response to identify if the host is compromised.
## Features
- Scans multiple IP addresses in one go.
- Supports HTTP and HTTPS protocols.
- Identifies compromised hosts based on a predefined string.
- Saves scan results to a CSV file along with a timestamp.
## Prerequisites
- Python 3.x
- `requests` Python library
## Installation
### Clone the Repository
To clone the repository, run the following command:
```bash
git clone https://github.com/yourusername/cisco_tester.git
```
## Install Required Packages
Make sure to install the requests library before running the script. Open your terminal and run:
```pip install requests```
### Or for Python 3:
```pip3 install requests```
# Usage
Running the Script
Navigate to the directory where cisco_tester.py is located.
Run the script using the command:
```python cisco_tester.py```
When prompted, enter the IP addresses you wish to scan, separated by commas.
Example
python cisco_tester.py
Enter comma-separated IP addresses: 192.168.1.1, 192.168.1.2
## Output
The script will display the scan results on the screen and also save them in a CSV file named scan_results.csv.
The CSV file will have the following columns:
IP Address: The scanned IP address.
Status: Status of the host ("Clean" or "Compromised by CVE-2023-20198").
Timestamp: The time the scan was performed.
# Contributing
Feel free to fork the repository and submit pull requests for any improvements or feature additions.