Identify Cisco Smart Install endpoints
This module attempts to connect to the specified Cisco Smart Install port and determines if it speaks the Smart Install Protocol. Exposure of SMI to untrusted networks can allow complete compromise of the switch.
Module Name
auxiliary/scanner/misc/cisco_smart_install
Authors
- Jon Hart <jon_hart [at] rapid7.com>
- Mumbai
References
- URL: https://blog.talosintelligence.com/2017/02/cisco-coverage-for-smart-install-client.html
- URL: https://blogs.cisco.com/security/cisco-psirt-mitigating-and-detecting-potential-abuse-of-cisco-smart-install-feature
- URL: https://tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-sr-20170214-smi
- URL: https://github.com/Cisco-Talos/smi_check
- URL: https://github.com/Sab0tag3d/SIET
Actions
- SCAN
- DOWNLOAD
Reliability
Development
Module Options
To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':
msf > use auxiliary/scanner/misc/cisco_smart_install
msf auxiliary(cisco_smart_install) > show actions
...actions...
msf auxiliary(cisco_smart_install) > set ACTION <action-name>
msf auxiliary(cisco_smart_install) > show options
...show and set options...
msf auxiliary(cisco_smart_install) > run