• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

CDPSnarf – CDP Packet Sniffer

April 30, 2008

Views: 13,287

[ad]

CDPSnarf if a network sniffer exclusively written to extract information from CDP packets. It provides all the information a “show cdp neighbors detail” command would return on a Cisco router and even more.

The application is written in C using the popular PCAP library.

Sample Output

Cisco AIR-AP1231G-E-K9 Access Point:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
 
$ sudo ./cdpsnarf eth2
Waiting for a CDP packet...
 
[#0] Sniffed CDP advertisement with a size of 367 bytes.
-------------------------------------------------------
CDP Version: 2
TTL: 180 ms
Checksum: 0x7282
 
Device ID: cisco-ap.mydomain.net
 
Software version: Cisco IOS Software, C1200 Software (C1200-K9W7-M),
Version 12.3(8)JEA, RELEASE SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2006 by Cisco Systems, Inc.
Compiled Wed 23-Aug-06 16:42 by kellythw
 
Platform: cisco AIR-AP1231G-E-K9
 
Addresses:  1
   Address #: 1
   Protocol type: [1] NLPID format
   Protocol: [0xCC] IP
   IP Address: 157.228.87.1
 
 
Port ID: Dot11Radio0
 
Capabilities:
   [0x02]       Transparent bridge

You can download CDPSnarf here:

CDPSnarf 0.1.6

Or read more here.

Related Posts:

  • dnsteal - DNS Exfiltration Tool
  • SUDO_KILLER - Auditing Sudo Configurations for…
  • fping 3 - Multi Target ICMP Ping Tool
  • dsniff Download - Tools for Network Auditing &…
  • AIEngine - AI-driven Network Intrusion Detection System
  • HTTrack - Website Downloader Copier & Site Ripper Download
Share
Tweet
Share
Buffer
WhatsApp
Email

Filed Under: Hacking Tools, Networking Hacking Tools Tagged With: cisco, hacking-cisco, hacking-networks, Network Hacking



Reader Interactions

Comments

  1. ZaD MoFo says

    April 30, 2008 at 10:32 pm

    I must admit: I’am kinda addicted to this site…

    Thank you http://www.darknet.org.uk !
    You have a very informative website. I come to visit periodically and whenever I visit each time I learn new tricks & tools.

    By the way: shutdown day this saturday…

    My best regards.

    ZaD MoFo

  2. Giacomo says

    May 1, 2008 at 12:12 am

    I think ethereal/wireshark is enought to discover this infos, without any other extra tool, isn’t it ?

  3. Bogwitch says

    May 1, 2008 at 11:18 am

    @Giacomo

    Yes, Wireshark will discover this information but you cannot set a capture filter for JUST this information.
    It’s the same as the dsniff tools, it has a much smaller footprint and performs a single task. I use the mailsnarf and urlsnarf utilities from dsniff on a regular basis for constant monitoring when Wireshark would be overkill.

  4. watcher says

    May 1, 2008 at 3:33 pm

    its nice to have something small like this, just think of how easy it is to see someone using wireshark or some other bandwidth hog, now try this one.

  5. Reticent says

    May 2, 2008 at 3:40 am

    @Bogwitch: I think you’ll find typing ‘cdp’ in the filter will do exactly that.

  6. Bogwitch says

    May 2, 2008 at 8:47 am

    @Reticent,
    I was talking specifically about capture filters rather than view filters. Sure, it can filter the view of cdp packets but the background capture is still capturing more packets than are specifically required. On a heavily loaded network, Wireshark can start running out of memory pretty fast if it is capturing large numbers of packets.
    Don’t get me wrong, wireshark is an exellent product and I use it often. If they could narrow the capture filters the same way that they narrow the view filters, I would probably use it even more!

  7. yoshi says

    May 2, 2008 at 9:02 pm

    nothing new here – cdpr has been doing this for years

  8. Reticent says

    May 4, 2008 at 12:37 am

    true. I usually capture stuff using tcpdump and write it to a file I open with wireshark; tcpdump gives you lots of nice options so you only end up with the traffic you wan’t to analyse (so it still suitable on busy networks). Alternatively, using the -A flag means you get to see the clear text protocols without using any sort of specialised tool anyway.

    Sorta offtopic, does anyone know a urlsnarf type application which is able to reconstruct html pages. Ie I run the tool and it’s able to write html pages locally as it see’s them? Wouldn’t mind having a play with such a tool.

  9. Umesh Chaurasia says

    July 29, 2008 at 10:53 am

    Hi,

    I want to capture CDP packets from windows environment. I downloaded you CDPSnarf sample.
    I also downloded getopt.c and getopt.h file from some other website.
    I am able to comile CDPSnarf application by commenting 2 lines //#include
    //#include

    In place of unistd.h, i am using getopt.h.

    When I am running my binary I am getting “unable to open Adapter” error. Following is the error details.
    ———————————————————-

    C:\Documents and Settings\umesh.c.PARSEC>D:\SW\CDPSnarf-v0.1.6\CDPSnarf-v0.1.6\R
    elease\cdpsnarf.exe -i CDP
    CDPSnarf v0.1.6 [$Rev: 797 $] initiated.
    Author: Zapotek
    Website: http://www.segfault.gr

    Couldn’t open device CDP: Error opening adapter: The system cannot find the device specified. (20)

    ————————————————————–

    Can you please suggest what I am doing wrong?

    Regards,
    Umesh

  10. dentonj says

    August 3, 2008 at 3:56 pm

    @yoshi

    From the code, CDPSnarf supports more CDP value types than cdpr.

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Systemic Ransomware Events in 2025 - How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Views: 2,168

Jaguar Land Rover’s prolonged cyber outage in 2025 turned what would once have been a “single … ...More about Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

SmbCrawler - SMB Share Discovery and Secret-Hunting

SmbCrawler – SMB Share Discovery and Secret-Hunting

Views: 2,037

SmbCrawler is a credentialed SMB spider that takes domain credentials and a list of hosts, then … ...More about SmbCrawler – SMB Share Discovery and Secret-Hunting

Heisenberg Dependency Health Check - GitHub Action for Supply Chain Risk

Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Views: 1,333

Heisenberg Dependency Health Check is a GitHub Action that inspects only the new or modified … ...More about Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Dark Web Search Engines in 2025 - Enterprise Monitoring, APIs and IOC Hunting

Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

Views: 3,188

Dark web search engines have become essential for enterprise security teams that need early … ...More about Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

mcp-scan - Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Views: 1,186

mcp-scan is a security tool from Invariant Labs that can run as a static scanner or as a dynamic … ...More about mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Initial Access Brokers (IAB) in 2025 - From Dark Web Listings to Supply Chain Ransomware Events

Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Views: 1,082

Initial Access Brokers (IABs) have moved from niche forum actors to central wholesalers in the … ...More about Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Topics

  • Advertorial (28)
  • Apple (46)
  • Cloud Security (8)
  • Countermeasures (232)
  • Cryptography (85)
  • Dark Web (6)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (433)
  • Forensics (64)
  • GenAI (13)
  • Hacker Culture (10)
  • Hacking News (237)
  • Hacking Tools (709)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (241)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (107)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (119)
  • Security Software (235)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (171)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker Hacker – Download brutus-aet2.zip AET2 (2,431,640)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,174,096)
  • Top 15 Security Utilities & Download Hacking Tools (2,097,549)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,200,346)
  • Password List Download Best Word List – Most Common Passwords (934,662)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (777,384)
  • Hack Tools/Exploits (674,308)
  • Wep0ff – Wireless WEP Key Cracker Tool (531,421)

Search

Recent Posts

  • Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like November 26, 2025
  • SmbCrawler – SMB Share Discovery and Secret-Hunting November 24, 2025
  • Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk November 21, 2025
  • Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting November 19, 2025
  • mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers November 17, 2025
  • Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events November 12, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2026 Darknet All Rights Reserved · Privacy Policy