SNMP
exchange management information between network devices, 161 trap on UDP 162
Links
https://en.wikipedia.org/wiki/Simple_Network_Management_Protocol
https://www.hackingarticles.in/snmp-lab-setup-and-penetration-testing/
https://www.hackingarticles.in/6-ways-to-hack-snmp-password/
YouTube
SNMP v1 - clear text
SNMP v2 - clear text
SNMP v3 - encrypted
apt-get install snmp-mibs-downloader
echo "" > /etc/snmp/snmp.confnmap scripts: smb-security-mode,smb-os-discovery
find snmp services nmap -sU -sS -Pn -sV -p 161 192.168.1.5
run nmap snmp enumeration scripts
nmap -sU -sV -n -Pn -p 161 --script=snmp-* <target IP>
nmap -sV -p 161 --script=snmp-info $ip/24
nmap {nmap_extra} -sV -p {port} --script="(snmp* or ssl*) and not (brute or broadcast or dos or external or fuzzer)"
nmap','-n','-sV','-Pn','-vv','-sU','-p','%s' % port,'--script=snmp-brute,snmp-hh3c-logins,snmp-info,snmp-ios-config,snmp-netstat,snmp-processes,snmp-sysdescr,snmp-win32-services,snmp-win32-shares,snmp-win32-software,snmp-win32-users,vulners','--script-args',"creds.snmp=:%s" % community,'-oA','/root/scripts/recon_enum/results/exam/snmp/%s_%s_snmp.nmap' % (ip_address,community),ip_address])
xprobe2 -v -p udp:161:open 192.168.1.200Brute - get community string
Metasploit
https://www.offensive-security.com/metasploit-unleashed/snmp-scan/
https://www.youtube.com/watch?v=j5NtakMaIJg&list=PLZOToVAK85MqxEPGXA80NPMZEczZfA9ej&index=140
SNMP Enumeration -Simple Network Management Protocol
Fix SNMP output values so they are human readable
apt-get install snmp-mibs-downloader download-mibsecho "" > /etc/snmp/snmp.conf
Last updated
Was this helpful?