OS support

This commit is contained in:
Corey Gilks
2019-02-07 10:51:47 -05:00
committed by GitHub
parent 8d45bf4ec3
commit 846a0317df

View File

@@ -5,6 +5,9 @@ This script parses an AnyConnect client connection and outputs a CSD file that c
**WARNING:** Doing this will bypass the checks hostscan performs. This may be against your company's policy. By using this script and the resulting CSD file, you are using these files at your own risk. This script is for educational purposes only.
# Using MacOS with the Hostscan Bypass
The hostscan bypass was originally coded and tested against a Windows machine running AnyConnect. I do not personally have the resources to troubleshoot issues on MacOS. However, [@cjbirk](https://github.com/cjbirk) did a bit of troubleshooting and successfully generated a CSD file using the bypass on MacOS. Please see [this issue](https://github.com/Gilks/hostscan-bypass/issues/4#issuecomment-461288105) for suggestions on troubleshooting any mac related issues.
# Blog
You can find the associated blog for this tool [here](https://gilks.github.io/post/cisco-hostscan-bypass).
@@ -21,3 +24,4 @@ Note: You will need to install go. That process won't be covered here.
1. `hostscan-bypass.go` was hacked off of [tcpprox](https://github.com/staaldraad/tcpprox). Thanks [@staaldraad](https://github.com/staaldraad)!
2. Fromzy, who posted the most [simple CSD](http://lists.infradead.org/pipermail/openconnect-devel/2015-January/002544.html) example
3. [@bmaddy](https://github.com/bmaddy), who [posted examples](https://gist.github.com/bmaddy/dc720f494fa4de28ffc03cc6a472e965) and resources that aided in the completion of this project
4. [@cjbirk](https://github.com/cjbirk) for taking the time to figure out how to successfully intercept AnyConnect on MacOS!