top of page

CDP FLOODING

Cisco Discovery Protocol (CDP) is a proprietary data-link layer protocol created by Cisco which is used to share the information on other directly connected cisco device in a given network. It includes the layer 3 information and its corresponding Operation system.

The objective of this topic is to flood the R1 with CDP messages using Yersinia Tool from Kali Linux.

Verify the interface status of R1 and R2.

Check the CDP neighbor on each router.

Before doing the CDP attack, Verify first the CPU process and the running CDP protocol.

We will use Yersinia tool to launch a CDP attack on R1 from the kali linux. To do this, on the command line type in Yersinia -G.

Click on the Launch Attack tab. On the Choose attack window, click on flooding CDP table then hit OK.

This will start the CDP attack on R1 by creating a dummy Device ID and sending it on the interface.

The effect will create a high CPU utilization because of the created CDP messages from the dummy device ID.

Again, doing this on a production environment will definitely have an effect on the performance of your device. Please inform Network Administrator if you will be doing this activity.

 

bottom of page