A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:


ASAReaper: Grab Configs From Multiple Cisco Devices Over SSH (Demos PExpect and AES Encrypted INI Files in Python)

ASAReaper: Grab Configs From Multiple Cisco Devices Over SSH
(Demos PExpect and AES Encrypted INI Files in Python)


        I got put in charge of managing a bunch of Cisco ASAs (Adaptive Security Appliances [firewalls, VPNs and such]). It was a new experience for me, and one of the first problems I encountered was backing up the configs, or getting them into text files so they were easier to search through. I would have thought there would be a free tool for this, but I found nothing. I could have tried to SCP files off, but SCP was not always configured and change management was such that I could not just enable it on a whim. FTP was a possibility, but I did not want my passwords flying across the network in plain text. SSH was there, so I wanted to use it. I ended up writing a script using several Python libraries to accomplish my goal of automatically sucking down Cisco configs using "show run" over an SSH connection. Here are some of the features of this Python script:

  • Uses PExpect to send commands to a Cisco ASA over SSH

  • Uses threading to do more than one Cisco device at a time and make it fast

  • Saves configuration in an AES encrypted INI file so you only have to use one password

  • Goes through every context on an ASA and saves the configs in separate text files for backup or viewing offline

Even if you don't manage Cisco ASAs, the code should be easy to modify for other Cisco devices you can access over SSH. You might even be interested in only using the encrypted INI portion.

Useage it is simple:

First run with non-existent config file to set it up (asa.txt contains the IPs, line by line, of the Cisco devices to backup the configs from).

irongeek@igbox:~/backups$ ./asareaper.py myconfig.ini
Give me the config password or Die!!! : <does not echo>
Host Names File: asas.txt
ASA User: irongeek
ASA User Password: <does not echo>
Enable Password: <does not echo>
Running on
Running on
Working on in the context admin...
Working on the context admin...
Working on in the context context1...
Working on in the context context1...
Working on in the context context2...
Working on in the context context2...

You should now have a bunch of text files in the same directory with names in the form of <asa name>-<context>-<timestamp>.TXT. The next time you run it, you should only have to put in one password:

irongeek@igbox:~/backups$ ./asareaper.py myconfig.ini
Give me the config password or Die!!! : <does not echo>
Running on
Running on
Working on in the context admin...
Working on the context admin...
Working on in the context context1...
Working on in the context context1...
Working on in the context context2...
Working on in the context context2.


Easy. You can also use the -d option to turn on more debugging. The script should be pretty harmless, but I take no liability if it screws something up. If you have a different setup, you can just use this script as a template for other tasks (I've used it to return the version number and serials of every ASA in a list before). Hope it is useful to someone.

Download Script

Or just read it:

  Exported from Notepad++

#!/usr/bin/env python

#Irongeek's Wacky script for harvesting configs from ASAs

#help from thes sites:




#and many others

import pexpect, re, getpass, os, time, ConfigParser, base64, hashlib, sys, random, datetime

from Crypto.Cipher import AES

import threading

from threading import Thread

import thread

commandonall="more system:run"



if len(sys.argv)<2:

sys.exit("I need a config file name to work with. If the file does not exist, we will create it. Use a '-d' after the file name to turn on debugging.")

configpassword = getpass.getpass('Give me the config password or Die!!! : ')

key = hashlib.sha256(configpassword).digest()

keyhash = hashlib.sha256(key).digest()


config = ConfigParser.RawConfigParser()


#If the file exists, we will read from it

if os.path.exists(configfilename):


#Check if password is correct

if keyhash != base64.b64decode(config.get('configs', 'Key_Hash')):

sys.exit ("Wrong Config Password! You Must Die!!!")


#If it is correct we can decrypt the INI file

iv = base64.b64decode(config.get('configs', 'IV'))

encryptor = AES.new(key, mode, iv)

hostnamesfile = config.get('configs', 'Host_Names_File')

asauserpass = encryptor.decrypt(base64.b64decode(config.get('configs', 'ASA_Password')))

enpass = encryptor.decrypt(base64.b64decode(config.get('configs', 'Enable_Password')))

asauser = encryptor.decrypt(base64.b64decode(config.get('configs', 'ASA_User')))


#If it did not exist, we prompt the user to create it

iv = ''.join(chr(random.randint(0, 0xFF)) for i in range(16))

encryptor = AES.new(key, mode, iv)

hostnamesfile = raw_input('Host Names File: ')

asauser = raw_input('ASA User: ')

asauserpass = getpass.getpass('ASA User Password: ')

enpass = getpass.getpass('Enable Password: ')


config.set('configs', 'IV', base64.b64encode(iv))

config.set('configs', 'Host_Names_File', hostnamesfile)

config.set('configs', 'Key_Hash', base64.b64encode(keyhash))

config.set('configs', 'ASA_Password', base64.b64encode(encryptor.encrypt(asauserpass)))

config.set('configs', 'Enable_Password', base64.b64encode(encryptor.encrypt(enpass)))

config.set('configs', 'ASA_User', base64.b64encode(encryptor.encrypt(asauser)))

with open(configfilename, 'wb') as configfile:



class GrabConfig(Thread):

def __init__ (self,host):


self.host = host.replace("\n","").replace("\r","")

self.status = -1

def run(self):


print "Running on " + self.host

child = pexpect.spawn ('ssh ' + asauser + '@' + self.host)


if "-d" in sys.argv:

child.logfile = sys.stdout


if i==0:

print "Sending SSH Password to " + self.host,


elif i==1:

print "Connection to " + self.host + " Dropped"


elif i==2: #timeout

print "Connection to " + self.host + " Timeout"



child.expect('.*>.*', timeout=tout)


child.expect('.*assword:.*', timeout=tout)


child.expect(".*# ", timeout=tout)

if "/admin" in child.after: # Only need to do this if we have contexts

child.sendline('changeto system')

child.expect(".*# ", timeout=tout)

child.sendline("terminal pager 0") #So "show run" keeps going

child.expect(".*# ", timeout=tout)

asaname = child.after.replace("#","").replace("\n","").replace("\r","").replace(" ","").replace("terminalpager0","")

child.sendline("show run | grep context")

child.expect(".*#", timeout=tout)

#Plan to to replace the below when I have better regex

contexts = re.findall("^context .*", child.after, re.MULTILINE)


child.expect(".*# ", timeout=tout)

f = open(prefixonall+asaname+"-"+self.host+"-"+datetime.datetime.now().strftime("%Y-%m-%d-%H:%M")+".TXT", 'w')


f.writelines(["%s\r\n" % line for line in configlines[1:-1]])


#Loops over each context, and grabs the ASA configs

for context in contexts:

context=context[8:].replace("#","").replace("\n","").replace("\r","").replace(" ","")

print "Working on " + self.host + " in the context " + context + "..."

child.sendline("changeto context "+context)

child.expect(".*# ", timeout=tout)


child.expect(".*# ", timeout=tout)


f = open(prefixonall+asaname+"-"+self.host+"-"+context+"-"+datetime.datetime.now().strftime("%Y-%m-%d-%H:%M")+".TXT", 'w')

f.writelines(["%s\r\n" % line for line in configlines[1:-1]])




print "Unexpected error:", sys.exc_info()[0]

print "Error on "+self.host


#Main loop of the program that spawns threads to connect to multiple ASAs at the same time

asalist = open(hostnamesfile).readlines()

for host in asalist:


Change Log:

06/13/2013: Updated the code to make it easier to maintain and to fix a timeout issue. Also, Arne Lovius told me about a tool called Rancid (http://www.shrubbery.net/rancid) that can do the same thing as my script and more, but I figured the sample code is still of help to some.
03/10/2014: Mostly updated for longer timeouts and to use "more system:run" so you can save passwords in the configs too. You should now just have to edit the commandonall and prefixonall to set the script up to run a given command on a series of Cisco ASAs in every context.

Printable version of this article

15 most recent posts on Irongeek.com:

If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast