/
10.2.2.1.5. ISDP Attack / Inspsection Attack
SecHard
10.2.2.1.5. ISDP Attack / Inspsection Attack
Cisco Discovery Protocol (CDP) and Industry Standard Discovery Protocol (ISDP) are used for similar purposes. Both provide a way to see what types of devices are connected on a link and some device configuration (IP address, software version, etc.). Often this information is used by network engineers to improve troubleshooting efficiency in large networks. However, this information is typically also available to anyone who is "listening", which means that an attacker would need to listen on the same connection to learn a large amount of information about connected devices.
, multiple selections available,
Related content
10.2.2.1.5. ISDP Attack / Inspsection Attack
10.2.2.1.5. ISDP Attack / Inspsection Attack
More like this
10.2.2.1.4. LLDP Attack / Inspsection Attack
10.2.2.1.4. LLDP Attack / Inspsection Attack
More like this
10.2.2.1.4. LLDP Attack / Inspsection Attack
10.2.2.1.4. LLDP Attack / Inspsection Attack
More like this
CDP - LLDP Attack
CDP - LLDP Attack
More like this
10.2.2.1.3. CDP Attack / Flooding Attack
10.2.2.1.3. CDP Attack / Flooding Attack
More like this
10.2.2.1.3. CDP Attack / Flooding Attack
10.2.2.1.3. CDP Attack / Flooding Attack
More like this
SecHard