Skip to content

SNMP Enumeration

lethanhtung01011980 edited this page Dec 27, 2019 · 8 revisions

Notes

  • SNMP protocols 1, 2, and 2c offer no traffic encryption
  • Weak authentication schemes
  • Commonly left configured with default public and private community strings

1. MIB tree

2. SNMP Scan

2.1 Nmap

  • nmap -sU --open -p 161 x.x.x.1-254 -oG mega-snmp.txt

2.2 onesixtyone

  • echo public > community
  • echo private >> community
  • echo manager >> community
  • for ip in $(seq 1 254);do echo x.x.x.$ip;done > ips
  • onesixtyone -c community -i ips

3. SNMP Enumeration

3.1 snmpwalk

  • Entire MIB Tree: snmpwalk -c public -v1 x.x.x.x
  • Windows Users: snmpwalk -c public -v1 x.x.x.x 1.3.6.1.4.1.77.1.2.25
  • Running Windows Processes: snmpwalk -c public -v1 x.x.x.x 1.3.6.1.2.1.25.4.2.1.2
  • Open TCP Ports: snmpwalk -c public -v1 x.x.x.x 1.3.6.1.2.1.6.13.1.3
  • Installed Software: snmpwalk -c public -v1 x.x.x.x 1.3.6.1.2.1.25.6.3.1.2

3.2 snmp-check

Need to wait a while for information

  • snmp-check -c public -v1 x.x.x.x
  • snmp-check -c public -v2c x.x.x.x

Sidebar

0. COMMON exploits

1. Scan Info

1.2 Passive Gathering

1.3 Active Gathering

2. Pre-attack

2.2 File transfer

3. Get Reverse Shell

4. Exploits

4.2 Windows Exploits

4.3 Linux Exploits

4.4 Password crack

4.5 Buffer Overflow

4.6 Web attacks

6. Escalate Privilege

6.1 Escalate in Windows

6.2 Escalate in Linux

7. Access and further attacks

8. Port redirection and Tunnelling

9. Metasploit

10. Kali

11. Thirdparty scripts

Clone this wiki locally