Update description and add link to SIET

This commit is contained in:
Jon Hart
2017-08-30 11:52:11 -07:00
parent e4fc307ebb
commit eec5d2ada9
@@ -15,7 +15,8 @@ class MetasploitModule < Msf::Auxiliary
'Name' => 'Identify Cisco Smart Install endpoints',
'Description' => %q(
This module attempts to connect to the specified Cisco Smart Install port
and determines if it speaks the Smart Install Protocol.
and determines if it speaks the Smart Install Protocol. Exposure of SMI
to untrusted networks can allow complete compromise of the switch.
),
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
'References' =>
@@ -23,7 +24,9 @@ class MetasploitModule < Msf::Auxiliary
['URL', 'https://blog.talosintelligence.com/2017/02/cisco-coverage-for-smart-install-client.html'],
['URL', 'https://blogs.cisco.com/security/cisco-psirt-mitigating-and-detecting-potential-abuse-of-cisco-smart-install-feature'],
['URL', 'https://tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-sr-20170214-smi'],
['URL', 'https://github.com/Cisco-Talos/smi_check']
['URL', 'https://github.com/Cisco-Talos/smi_check'],
['URL', 'https://github.com/Sab0tag3d/SIET']
],
'License' => MSF_LICENSE
)