SNMP

exchange management information between network devices, 161 trap on UDP 162

Links

https://en.wikipedia.org/wiki/Simple_Network_Management_Protocol

https://www.hackingarticles.in/snmp-lab-setup-and-penetration-testing/

https://www.hackingarticles.in/6-ways-to-hack-snmp-password/

YouTube

SNMP v1 - clear text

SNMP v2 - clear text

SNMP v3 - encrypted

apt-get install snmp-mibs-downloader
echo "" > /etc/snmp/snmp.conf

nmap scripts: smb-security-mode,smb-os-discovery

find snmp services nmap -sU -sS -Pn -sV -p 161 192.168.1.5

run nmap snmp enumeration scripts

nmap -sU -sV -n -Pn -p 161 --script=snmp-* <target IP>
nmap -sV -p 161 --script=snmp-info $ip/24
nmap {nmap_extra} -sV -p {port} --script="(snmp* or ssl*) and not (brute or broadcast or dos or external or fuzzer)"
nmap','-n','-sV','-Pn','-vv','-sU','-p','%s' % port,'--script=snmp-brute,snmp-hh3c-logins,snmp-info,snmp-ios-config,snmp-netstat,snmp-processes,snmp-sysdescr,snmp-win32-services,snmp-win32-shares,snmp-win32-software,snmp-win32-users,vulners','--script-args',"creds.snmp=:%s" % community,'-oA','/root/scripts/recon_enum/results/exam/snmp/%s_%s_snmp.nmap' % (ip_address,community),ip_address])

xprobe2 -v -p udp:161:open 192.168.1.200

Brute - get community string

Metasploit

https://www.offensive-security.com/metasploit-unleashed/snmp-scan/

https://www.youtube.com/watch?v=j5NtakMaIJg&list=PLZOToVAK85MqxEPGXA80NPMZEczZfA9ej&index=140

SNMP Enumeration -Simple Network Management Protocol

  • Fix SNMP output values so they are human readable

    apt-get install snmp-mibs-downloader download-mibs

    echo "" > /etc/snmp/snmp.conf

Last updated

Was this helpful?