Skip to content

Commit

Permalink
Final touchups
Browse files Browse the repository at this point in the history
  • Loading branch information
Gilks committed Jul 24, 2018
1 parent 1338d5b commit d1e8a2b
Showing 1 changed file with 5 additions and 5 deletions.
10 changes: 5 additions & 5 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,15 +1,15 @@
# hostscan-bypass
# Hostscan Bypass
Generate an OpenConnect Cisco Secure Desktop [(CSD)](http:https://www.infradead.org/openconnect/csd.html) file that bypasses AnyConnect hostscan requirements.

This script parses an AnyConnect client connection and outputs a CSD file that can be used with OpenConnect. The CSD file will perform a POST request to the AnyConnect server, giving the illusion a hostscan took place. Even if the AnyConnect server does not publish binaries for your Operating System (OS), you will still be able to connect. This is due to the fact that OpenConnect allows you to specify which OS you are connecting from. This means you can be on a Linux and pretend to be a Windows client!
This script parses an AnyConnect client connection and outputs a CSD file that can be used with OpenConnect. The CSD file will perform a POST request to the AnyConnect server, giving the illusion a hostscan took place. Even if the AnyConnect server does not publish binaries for your Operating System (OS), you will still be able to connect. This is due to the fact that OpenConnect allows you to specify which OS you are connecting from. This means you can be on a Linux box and pretend to be a Windows client!

WARNING: Doing this will bypass the checks hostscan performs. This may be against your companies policy. By using this script and the resulting CSD file, you are releasing me of any liability. This script is for educational purposes only.
**WARNING:** Doing this will bypass the checks hostscan performs. This may be against your companies policy. By using this script and the resulting CSD file, you are using these files at your own risk. This script is for educational purposes only.

# Blog
You can find the associated blog for this tool [here](https://gilks.github.io/post/cisco-hostscan-bypass).

# Quick Start
*Note: You will need to install go. That process won't be covered here.
Note: You will need to install go. That process won't be covered here.

1. `sudo go run hostscan-bypass.go -l <YOUR IP> -p 443 -r <TARGET VPN URL>:443 -s`
2. Use AnyConnect and connect to `<YOUR IP>`
Expand All @@ -19,5 +19,5 @@ You can find the associated blog for this tool [here](https://gilks.github.io/po

# Shout Outs
1. `hostscan-bypass.go` was hacked off of [tcpprox](https://github.com/staaldraad/tcpprox). Thanks [@staaldraad](https://github.com/staaldraad)!
2. Fromzy, who happened to posted the most [simple CSD](http:https://lists.infradead.org/pipermail/openconnect-devel/2015-January/002544.html) example
2. Fromzy, who posted the most [simple CSD](http:https://lists.infradead.org/pipermail/openconnect-devel/2015-January/002544.html) example
3. [@bmaddy](https://github.com/bmaddy), who [posted examples](https://gist.github.com/bmaddy/dc720f494fa4de28ffc03cc6a472e965) and resources that aided in the completion of this project

0 comments on commit d1e8a2b

Please sign in to comment.