View Single Post
  #1  
Old 05-20-2021, 10:58 AM
MARCUSR MARCUSR is offline
Registered User
 
Join Date: May 2021
Posts: 1
Cisco ASA Profile not working on SecureFX

Code:
i SecureFX version 9.0.2.2496 (Official Release - May 20, 2021)
i Attempting to connect to 10.225.225.99
i Session window 00002 established for session AACFW01-102302-Y39 - 10.225.225.99
i SSH2Core version 9.0.2.2496
i Connecting to 10.225.225.99:22 ...
i Changing state from STATE_NOT_CONNECTED to STATE_EXPECT_KEX_INIT
i Using protocol SSH2
i RECV : Remote Identifier = 'SSH-2.0-Cisco-1.25'
i CAP  : Remote can re-key
i CAP  : Remote sends language in password change requests
i CAP  : Remote sends algorithm name in PK_OK packets
i CAP  : Remote sends algorithm name in public key packets
i CAP  : Remote sends algorithm name in signatures
i CAP  : Remote sends error text in open failure packets
i CAP  : Remote sends name in service accept packets
i CAP  : Remote includes port number in x11 open packets
i CAP  : Remote uses 160 bit keys for SHA1 MAC
i CAP  : Remote supports new diffie-hellman group exchange messages
i CAP  : Remote correctly handles unknown SFTP extensions
i CAP  : Remote correctly encodes OID for gssapi
i CAP  : Remote correctly uses connected addresses in forwarded-tcpip requests
i CAP  : Remote can do SFTP version 4
i CAP  : Remote uses SHA1 hash in RSA signatures for x.509v3
i CAP  : Remote x.509v3 uses ASN.1 encoding for DSA signatures
i CAP  : Remote correctly handles zlib@openssh.com
i SSPI : Requesting full delegation
i SSPI : [Kerberos] SPN : host@10.225.225.99
i SSPI : [Kerberos] InitializeSecurityContext() failed.
i SSPI : [Kerberos] The specified target is unknown or unreachable
i SSPI : [Kerberos] Disabling gss mechanism
i GSS  : Requesting full delegation
i GSS  : [Kerberos] SPN : host@10.225.225.99
i GSS  : [Kerberos] InitializeSecurityContext() failed.
i GSS  : [Kerberos] Could not load library 'gssapi64.dll': The specified module could not be found.
i GSS  : [Kerberos] Disabling gss mechanism
i GSS  : [Kerberos] Disabling gss mechanism
i The following key exchange method has been filtered from the key exchange method list because it is not supported: gss-group1-sha1-toWM5Slw5Ew8Mqkay+al2g==
i SSPI : Requesting full delegation
i SSPI : [Kerberos (Group Exchange)] SPN : host@10.225.225.99
i SSPI : [Kerberos (Group Exchange)] InitializeSecurityContext() failed.
i SSPI : [Kerberos (Group Exchange)] The specified target is unknown or unreachable
i SSPI : [Kerberos (Group Exchange)] Disabling gss mechanism
i GSS  : Requesting full delegation
i GSS  : [Kerberos (Group Exchange)] SPN : host@10.225.225.99
i GSS  : [Kerberos (Group Exchange)] InitializeSecurityContext() failed.
i GSS  : [Kerberos (Group Exchange)] Could not load library 'gssapi64.dll': The specified module could not be found.
i GSS  : [Kerberos (Group Exchange)] Disabling gss mechanism
i GSS  : [Kerberos (Group Exchange)] Disabling gss mechanism
i The following key exchange method has been filtered from the key exchange method list because it is not supported: gss-gex-sha1-toWM5Slw5Ew8Mqkay+al2g==
i SEND : KEXINIT
i SEARCH: C:\ProgramData\VanDyke\Known Hosts\
i SEARCH: C:\Users\__REDACTED__\AppData\Roaming\VanDyke\Config\KnownHosts\
i RECV : Read kexinit
i Available Remote Kex Methods = diffie-hellman-group1-sha1
i Selected Kex Method = diffie-hellman-group1-sha1
i Available Remote Host Key Algos = ssh-rsa
i Selected Host Key Algo = ssh-rsa
i Available Remote Send Ciphers = aes128-cbc,aes192-cbc,aes256-cbc,aes128-ctr,aes192-ctr,aes256-ctr
i Selected Send Cipher = aes256-ctr
i Available Remote Recv Ciphers = aes128-cbc,aes192-cbc,aes256-cbc,aes128-ctr,aes192-ctr,aes256-ctr
i Selected Recv Cipher = aes256-ctr
i Available Remote Send Macs = hmac-sha1,hmac-sha1-96
i Selected Send Mac = hmac-sha1-96
i Available Remote Recv Macs = hmac-sha1,hmac-sha1-96
i Selected Recv Mac = hmac-sha1-96
i Available Remote Compressors = none
i Selected Compressor = none
i Available Remote Decompressors = none
i Selected Decompressor = none
i Changing state from STATE_EXPECT_KEX_INIT to STATE_KEY_EXCHANGE
i SEND : KEXDH_INIT
i RECV : KEXDH_REPLY
i Changing state from STATE_KEY_EXCHANGE to STATE_READY_FOR_NEW_KEYS
i RECV: Remote Hostkey (SHA-2 hash hex): 00:db:0c:e1:71:c2:45:ee:14:8a:de:e9:7a:73:12:d4:66:a4:ca:44:3c:8d:b7:43:71:51:53:93:7e:6e:bd:0c
i RECV: Remote Hostkey (SHA-2 hash base64): ANsM4XHCRe4Uit7penMS1GakykQ8jbdDcVFTk35uvQw
i RECV: Remote Hostkey (SHA-1 hash): de:f9:95:61:77:c9:3a:2f:3b:d9:40:0e:94:f5:e9:1f:d0:2b:e7:84
i RECV: Remote Hostkey (MD5 hash): c8:01:83:84:3e:aa:a7:c2:bd:ab:e3:45:e1:64:0c:83
i SEARCH: 0 entries found for host
i SEARCH: 1 entries found for host
i SEARCH: hostkey was matched in database.
i SEND : NEWKEYS
i Changing state from STATE_READY_FOR_NEW_KEYS to STATE_EXPECT_NEWKEYS
i RECV : NEWKEYS
i Changing state from STATE_EXPECT_NEWKEYS to STATE_CONNECTION
i SEND: SERVICE_REQUEST[ssh-userauth]
i RECV: SERVICE_ACCEPT[ssh-userauth] -- OK
i SENT : USERAUTH_REQUEST [none]
i Authenticating as user __REDACTED___
i RECV : SSH_MSG_USERAUTH_BANNER
i This U.S government system is intended to be used by
i [authorized __REDACTED__ network users] for viewing and retrieving information only,
i except as otherwise explicitly authorized. __REDACTED__ information resides on and
i transmits through computer systems and networks funded by __REDACTED__. All use
i is considered to be with an understanding and acceptance that there is no
i reasonable expectation of privacy for any data or transmissions on
i Government Intranet or Extranet (non-public) networks or systems. All
i transactions that occur on this system and all data transmitted through
i this system are subject to review and action including (but not limited to)
i monitoring, recording, retrieving, copying, auditing, inspecting,
i investigating, restricting access, blocking, tracking, disclosing to
i authorized personnel, or any other authorized actions by all authorized __REDACTED__
i and law enforcement personnel. All use of this system constitutes
i understanding and unconditional acceptance of these terms. Unauthorized
i attempts or acts to either (1) access, upload, change, or delete
i information on this system, (2) modify this system, (3) deny access to this
i system, or (4) accrue resources for unauthorized use on this system are
i strictly prohibited. Such attempts or acts are subject to action that may
i result in criminal, civil, or administrative penalties.
i 
i RECV : USERAUTH_FAILURE, continuations [publickey,password]
i SENT : USERAUTH_REQUEST [password]
i RECV : AUTH_SUCCESS
i SEND[0]: SSH_MSG_CHANNEL_OPEN('session')
i SEND[0]: Pty Request (term: vt100, rows: 1024, cols: 256)
i RECV[0]: pty request succeeded
i SEND[0]: shell request
i RECV[0]: shell request succeeded
i RECV[0]: This U.S government system is intended to be used by
i RECV[0]: [authorized __REDACTED__ network users] for viewing and retrieving information only,
i RECV[0]: except as otherwise explicitly authorized. __REDACTED__ information resides on and
i RECV[0]: transmits through computer systems and networks funded by __REDACTED__. All use
i RECV[0]: is considered to be with an understanding and acceptance that there is no
i RECV[0]: reasonable expectation of privacy for any data or transmissions on
i RECV[0]: Government Intranet or Extranet (non-public) networks or systems. All
i RECV[0]: transactions that occur on this system and all data transmitted through
i RECV[0]: this system are subject to review and action including (but not limited to)
i RECV[0]: monitoring, recording, retrieving, copying, auditing, inspecting,
i RECV[0]: investigating, restricting access, blocking, tracking, disclosing to
i RECV[0]: authorized personnel, or any other authorized actions by all authorized __REDACTED__
i RECV[0]: and law enforcement personnel. All use of this system constitutes
i RECV[0]: understanding and unconditional acceptance of these terms. Unauthorized
i RECV[0]: attempts or acts to either (1) access, upload, change, or delete
i RECV[0]: information on this system, (2) modify this system, (3) deny access to this
i RECV[0]: system, or (4) accrue resources for unauthorized use on this system are
i RECV[0]: strictly prohibited. Such attempts or acts are subject to action that may
i RECV[0]: result in criminal, civil, or administrative penalties.
i RECV[0]: This U.S government system is intended to be used by
i RECV[0]: [authorized __REDACTED__ network users] for viewing and retrieving information only,
i RECV[0]: except as otherwise explicitly authorized. __REDACTED__ information resides on and
i RECV[0]: transmits through computer systems and networks funded by __REDACTED__. All use
i RECV[0]: is considered to be with an understanding and acceptance that there is no
i RECV[0]: reasonable expectation of privacy for any data or transmissions on
i RECV[0]: Government Intranet or Extranet (non-public) networks or systems. All
i RECV[0]: transactions that occur on this system and all data transmitted through
i RECV[0]: this system are subject to review and action including (but not limited to)
i RECV[0]: monitoring, recording, retrieving, copying, auditing, inspecting,
i RECV[0]: investigating, restricting access, blocking, tracking, disclosing to
i RECV[0]: authorized personnel, or any other authorized actions by all authorized __REDACTED__
i RECV[0]: and law enforcement personnel. All use of this system constitutes
i RECV[0]: understanding and unconditional acceptance of these terms. Unauthorized
i RECV[0]: attempts or acts to either (1) access, upload, change, or delete
i RECV[0]: information on this system, (2) modify this system, (3) deny access to this
i RECV[0]: system, or (4) accrue resources for unauthorized use on this system are
i RECV[0]: strictly prohibited. Such attempts or acts are subject to action that may
i RECV[0]: result in criminal, civil, or administrative penalties.
i RECV[0]: User __REDACTED___ logged in to AACFW01-52283-Y40
i RECV[0]: Logins over the last 43 days: 2.  Last login: 15:46:56 GMT Apr 30 2021 from 10.224.189.18
i RECV[0]: Failed logins since the last login: 0.
i RECV[0]: Type help or '?' for a list of available commands.
i SEND[0]: terminal length 0
i RECV[0]: AACFW01-52282-Y40/admin/act/pri# terminal length 0
i RECV[0]:                                           ^
i RECV[0]: ERROR: % Invalid input detected at '^' marker.
i SEND[0]: enable
i RECV[0]: AACFW01-52282-Y40/admin/act/pri# enable
i RECV[0]:                                   ^
i RECV[0]: ERROR: % Invalid input detected at '^' marker.
i SEND[0]: pwd
i RECV[0]: AACFW01-52282-Y40/admin/act/pri# pwd
i RECV[0]:                                   ^
i RECV[0]: ERROR: % Invalid input detected at '^' marker.
i SCP command failed.
i Remote operating system type is Cisco ASA.
i SEND[0]: cd
i RECV[0]: AACFW01-52282-Y40/admin/act/pri# cd
i RECV[0]:                                   ^
i RECV[0]: ERROR: % Invalid input detected at '^' marker.
i SEND[0]: dir
i RECV[0]: AACFW01-52282-Y40/admin/act/pri# dir
i RECV[0]:                                    ^
i RECV[0]: ERROR: % Invalid input detected at '^' marker.

Last edited by jdev; 05-20-2021 at 11:23 AM. Reason: Remove sensitive information that should have been redacted by OP
Reply With Quote