Skip to content

Python script/security tool to test Dynamic Trunking Protocol configuration on a switch.

License

Notifications You must be signed in to change notification settings

fleetcaptain/dtp-spoof

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 

Repository files navigation

DTP-SPOOF

dtp-spoof is a security tool to test the Dynamic Trunking Protocol (DTP) configuration of switches. If the target switch is configured to negotiate the port mode, you can potentially set the target switch's port to Trunk mode, thereby gaining access to additional VLANs.

DO NOT use this script for illegal activites! Use it only on networks you own or for which you have permission to audit.

Some tips:

  • The switch might not send you any traffic to indicate you have successfully formed a trunk.

  • If DTP has been disabled on a switchport, the script won't change anything.

  • Asking for 'trunk' mode is the default option but 'desireable', 'auto', and 'access' modes are available.

  • You must specifiy an interface to send the packets from.

  • You can, but do not have to, spoof your MAC address with the -m option. If you do so, the supplied mac address will be used for both the source address of the Ethernet frame and the neighbor MAC field within the DTP packet.

Examples:

python dtp-spoof.py -i eth0 //sends a DTP Trunk packet out eth0 using eth0's mac address

python dtp-spoof.py -i eth0 --desirable -m 00:05:3a:55:3a:1c //sends a DTP Dynamic Desirable packet out eth0 using 00:05:3a:55:3a:1c as the frame source and DTP neighbor mac addresses

About

Python script/security tool to test Dynamic Trunking Protocol configuration on a switch.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Languages