SNMP (161-162)
Simple Network Management Protocol.
Port
161 UDP
SNMP, commands
162 UDP
SNMP, traps sent from server to clients when certain events occur.
Config File
/etc/snmp/snmpd.conf(LINK)
Interact
MIB Trees
1.3.6.1.2.1.25.1.6.0 System Processes
1.3.6.1.2.1.25.4.2.1.2 Running Programs
1.3.6.1.2.1.25.4.2.1.4 Processes Path
1.3.6.1.2.1.25.2.3.1.4 Storage Units
1.3.6.1.2.1.25.6.3.1.2 Software Name
1.3.6.1.4.1.77.1.2.25 User Accounts
1.3.6.1.2.1.6.13.1.3 TCP Local PortsTools
Details
snmpwalk -c <COMUNITY_STRING> -v <1-2c-3> <IP> [<OID>]
snmpwalk -c <COMUNITY_STRING> -v <1-2c> <IP>
Attacks
Brute force Comunity Strings and OID
Tools
Details
Brute force Comunity String.
onesixtyone -c <WORDLIST> <IP>
Brute force OID.
braa <COMUNITY_STRING>@<IP>:.1.3.6.*
SecLists/Discovery/SNMP/snmp.txt
metasploit-framework/data/wordlists/snmp_default_pass.txt
If we imagine an extended network with more than 100 different servers managed through SNMP, the labels, in that case, will have some pattern. Therefore, we can use different rules to guess them. We can use the crunch tool to create custom word lists.
Last updated
Was this helpful?