Translate

Thursday, 17 October 2019

OSCP- Enumeration SNMP

SNMP - Simple Network Mapping Protocol- Port 161

Enumeration:

1) nc <victim_ip> 161

2) telnet <victim_ip> 161

3) nmap

nmap --script snmp-info,snmp-brute,snmp-interfaces,snmp-processes,snmp-win32-users,snmp-win32-software,snmp-win32-shares,snmp-win32services <victim_ip> -p161
4)snmpwalk

snmpwalk -c public -v1 <victim_ip> #community string and which version
MIB-Management Information Base codes

1.3.6.1.2.1.25.1.6.0 System Processes
1.3.6.1.2.1.25.4.2.1.2 Running Programs
1.3.6.1.2.1.25.4.2.1.4 Processes Path
1.3.6.1.2.1.25.2.3.1.4 Storage Units
1.3.6.1.2.1.25.6.3.1.2 Software Name
1.3.6.1.4.1.77.1.2.25 User Accounts
1.3.6.1.2.1.6.13.1.3 TCP Local Ports

5) snmp-check

snmp-check -t 192.168.1.101 -c public
6) Onesixtyone

onesixtyone <victim_ip> -c <community file name to try>


Exploitation:


use "exploit-db.com" to find the latest exploits for snmp

No comments:

Post a Comment