m33tfinder is a tool to detect active conference ID ranges in a Cisco Meeting Server.

Tool description

m33tfinder is a tool to detect active conference ID ranges in a Cisco Meeting Server.

The tool allow you to check the potential weakness of the associated passcodes. Pins.txt contains, for example, 4 digits passcodes.

This tool is intended to check if the server is vulnerable to Cisco Meeting Server Information Disclosure Vulnerability page (CVE-2018-15446) and are for educational and testing purposes only.

Functionalities

Run with Python and provide a Cisco Meeting Server to test.
m33tfinder
OUR TOOLS

Maltego Transforms for Tacyt

THREATS AND VULNERABILITIES

Since Tacyt counts with a comprehensive API and a SDK for an easier used we presented this natural step to created transforms with Maltego.

Certificate Transparency

CONFIDENCE ON THE INTERNET

Certificate Transparency is a new layer of security on top of TLS ecosystem.

DirtyTooth for Raspberry Pi

THREATS AND VULNERABILITIES

This tool represents a software implementation of the DirtyTooth Speaker in the form of a .deb package for Raspberry Pi.