Metasploit module for imitating Cisco devices
Posted on 02 August 2011.
SecureState announced the release of the CDP tool, an additional module for the Metasploit Framework, this time for forging Cisco Discovery Protocol frames.

The Cisco Discovery Protocol has had a history of vulnerabilities in various IOS products. It is used in Cisco environments for devices to advertise information to other Cisco devices, such as versions and capabilities.

Exploiting this protocol has usually resulted in Denial of Service conditions and required using various programs from less than reputable sources. One notable exception to this is Yersinia.

However, the Metasploit Framework has been distributed with the Racket library, that provides an interface for forging raw CDP frames, provided by Jon Hart. SecureState is releasing a module that allows users to take advantage of this functionality.

The module allows users to set the various parameters of a CDP frame and then transmit it as often as they'd like to transmit. This is useful in situations where a user needs to imitate a Cisco device, such as a VoIP phone.

Within the past year, another CDP bug was discovered in the Nexus line of switches from Cisco by George Hedfors. This bug, which was given the ID CSCtf08873, is triggered when a CDP message is received by the device with a "Device ID" greater than 255 bytes. Hedfors submitted the bug in the summer of 2010, and recently discussed it in his Black Hat EU presentation, "Owning the Data Centre."

To download the CDP tool, go here.


Pen-testing drone searches for unsecured devices

You're sitting in an office, and you send a print job to the main office printer. You see or hear a drone flying outside your window. Next thing you know, the printer buzzes to life and, after spitting out your print job, it continues to work and presents you with more filled pages than you expected.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Fri, Oct 9th