akde/infosec

Information security is ultimately about managing risk


Detect SNMP-devices:

nmap -sU --open -p 161 10.11.1.1-254 -oG mega-snmp.txt

onesixtyone

Brute force of com­mu­ni­ty strings against IPs. The fol­low­ing exam­ple tries to log in into SMTP devis­es via a giv­en IP and giv­en com­mu­ni­ty names.

echo public > community
echo private >> community
echo manager >> community
for ip in $(seq 1 254);do echo 10.11.1.$ip;done > ips onesixtyone -c community -i ips

SNMPCheck

Like SNM­P­Walk:

snmpcheck -t $target -c public

SNMPWalk

  1. Sim­ple enu­mer­a­tion with snm­p­walk to show which SNMP val­ues are pro­vid­ed by a device giv­en the com­mu­ni­ty name (most­ly public):
snmpwalk -c public -v1 10.11.1.115 10.10.10.10 ...(multiple ips are possible)

This result in a ist of SNMP para­me­ters like

1.3.6.1.2.1.6.13.1.3

See oth­er resources to check the seman­tic behind the OIDs:

To obtain detailed infor­ma­tion / the val­ues of a OID:

snmpwalk -c public -v1 10.11.1.115 1.3.6.1.2.1.6.13.1.3

Use­ful examples:

  • All cur­rent­ly run­ning process­es:
    snmpwalk -c public -v1 10.11.1.115 1.3.6.1.2.1.25.4.2.1.2
  • All cur­rent­ly open TCP lis­ten­ing ports:
    snmpwalk -c public -v1 10.11.1.115 1.3.6.1.2.1.6.13.1.3

Leave a Reply

About

Personal collection of some infosec stuff. Primary purpose of this site is to collect and organize for myself.

Note: Some content is not publicly visible due to copyright issues. Therefore, some links could be broken.

Checklists

Categories

Checklists: Ports

python -c 'import pty;pty.spawn("/bin/bash")';

python3 -c 'import pty;pty.spawn("/bin/bash")';