SNMP - Simple Network Mapping Protocol- Port 161
Enumeration:
1) nc <victim_ip> 161
2) telnet <victim_ip> 161
3) nmap
5) snmp-check
Exploitation:
Enumeration:
1) nc <victim_ip> 161
2) telnet <victim_ip> 161
3) nmap
nmap --script snmp-info,snmp-brute,snmp-interfaces,snmp-processes,snmp-win32-users,snmp-win32-software,snmp-win32-shares,snmp-win32services <victim_ip> -p161
4)snmpwalksnmpwalk -c public -v1 <victim_ip> #community string and which version
MIB-Management Information Base codes1.3.6.1.2.1.25.1.6.0 System Processes
1.3.6.1.2.1.25.4.2.1.2 Running Programs
1.3.6.1.2.1.25.4.2.1.4 Processes Path
1.3.6.1.2.1.25.2.3.1.4 Storage Units
1.3.6.1.2.1.25.6.3.1.2 Software Name
1.3.6.1.4.1.77.1.2.25 User Accounts
1.3.6.1.2.1.6.13.1.3 TCP Local Ports
5) snmp-check
snmp-check -t 192.168.1.101 -c public
6) Onesixtyoneonesixtyone <victim_ip> -c <community file name to try>
Exploitation:
use "exploit-db.com" to find the latest exploits for snmp
No comments:
Post a Comment