Skip to content

Commit e4fc307

Browse files
committed
Add docs
1 parent 7b18c17 commit e4fc307

File tree

1 file changed

+30
-0
lines changed

1 file changed

+30
-0
lines changed
Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
## Vulnerable Application
2+
3+
Any system exposing the Cisco Smart Install protocoll, SMI, typically on 4786/TCP.
4+
5+
## Verification Steps
6+
7+
1. Do: ```use auxiliary/scanner/misc/cisco_smart_install```
8+
2. Do: ```set [RHOSTS]```, replacing ```[RHOSTS]``` with a list of hosts to test for the presence of SMI
9+
3. Do: ```run```
10+
4. If the host is exposing an identifiable SMI instance, it will print the endpoint.
11+
12+
13+
## Scenarios
14+
15+
```
16+
msf auxiliary(cisco_smart_install) > run
17+
18+
[*] Scanned 57 of 512 hosts (11% complete)
19+
[*] Scanned 105 of 512 hosts (20% complete)
20+
[*] Scanned 157 of 512 hosts (30% complete)
21+
[*] Scanned 212 of 512 hosts (41% complete)
22+
[*] Scanned 256 of 512 hosts (50% complete)
23+
[*] Scanned 310 of 512 hosts (60% complete)
24+
[*] Scanned 368 of 512 hosts (71% complete)
25+
[*] Scanned 413 of 512 hosts (80% complete)
26+
[*] Scanned 466 of 512 hosts (91% complete)
27+
[+] a.b.c.d:4786 - Fingerprinted the Cisco Smart Install protocol
28+
[*] Scanned 512 of 512 hosts (100% complete)
29+
[*] Auxiliary module execution completed
30+
```

0 commit comments

Comments
 (0)