Update description and add link to SIET
parent
e4fc307ebb
commit
eec5d2ada9
|
@ -15,7 +15,8 @@ class MetasploitModule < Msf::Auxiliary
|
|||
'Name' => 'Identify Cisco Smart Install endpoints',
|
||||
'Description' => %q(
|
||||
This module attempts to connect to the specified Cisco Smart Install port
|
||||
and determines if it speaks the Smart Install Protocol.
|
||||
and determines if it speaks the Smart Install Protocol. Exposure of SMI
|
||||
to untrusted networks can allow complete compromise of the switch.
|
||||
),
|
||||
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
|
||||
'References' =>
|
||||
|
@ -23,7 +24,9 @@ class MetasploitModule < Msf::Auxiliary
|
|||
['URL', 'https://blog.talosintelligence.com/2017/02/cisco-coverage-for-smart-install-client.html'],
|
||||
['URL', 'https://blogs.cisco.com/security/cisco-psirt-mitigating-and-detecting-potential-abuse-of-cisco-smart-install-feature'],
|
||||
['URL', 'https://tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-sr-20170214-smi'],
|
||||
['URL', 'https://github.com/Cisco-Talos/smi_check']
|
||||
['URL', 'https://github.com/Cisco-Talos/smi_check'],
|
||||
['URL', 'https://github.com/Sab0tag3d/SIET']
|
||||
|
||||
],
|
||||
'License' => MSF_LICENSE
|
||||
)
|
||||
|
|
Loading…
Reference in New Issue