πŸ‘¨β€πŸ’»
Jawad's Notes
  • πŸ‘¨β€πŸ«INFOSEC
    • πŸ•ΈοΈWeb
      • Burp Suite: Setting Foxyproxy
      • XSS
      • Wappalyzer
      • Directory Traversal
      • LFI
        • PHP Wrappers
        • RFI
      • Reverse Shell
        • Command Injection Quick Tips
      • File Upload
      • WPScan
      • SQL Injection
        • Schemas
        • SQLmap
        • MSSQL
        • MySQL
        • PostgreSQL
    • πŸ”§Tools
      • Whois
      • DNSRecon
      • DNSenum
      • nslookup
      • Netcat
        • Powercat
      • Nmap
        • Nmap Scripting Engine
        • Test-NetConnection
        • Grep
      • Server Message Block (SMB)
      • SNMP
      • SMTP
      • ExifTool
      • Search Engine Hacking
      • Source Control Hacking
      • Nessus
      • Canarytokens
      • Qualys SSL Server Test
      • Security Headers
      • theHarvester
      • Shodan
      • Gobuster
        • Dirb
      • Searchsploit
      • Password Cracking
        • Hashcat
        • John The Ripper
        • Hydra
        • hashID
        • CPU vs GPU
    • 🐧Linux
      • Symbols
      • cat
      • curl
      • openvpn
      • tcpdump
      • Remote Desktop
      • SmbShare
      • Tmux
      • Convert Windows-style line endings (CRLF) to Unix-style (LF)
      • SSH
    • πŸ–₯️Macros in Office
    • 🍎Enhancing Your MacOS Terminal Experience
    • 🚩CTF
      • SQL Injection
        • WHERE clause allowing retrieval of hidden data
        • Allowing login bypass
        • UNION attack, determining the number of columns returned by the query
        • UNION attack, finding a column containing text
        • UNION attack, retrieving data from other tables
        • UNION attack, retrieving multiple values in a single column
        • Querying the database type and version on Oracle
Powered by GitBook
On this page
  1. INFOSEC
  2. Tools

SNMP

  1. SNMP (Simple Network Management Protocol):

    • What it does: SNMP is a protocol used for managing and monitoring devices on a network.

    • How it works: It allows devices (like routers, servers, printers) to communicate their status and information to a central management system.

    • Key idea: Think of it like a language that devices use to report their health and status to a network manager.

  2. MIB (Management Information Base):

    • What it is: MIB is like a dictionary that defines the structure and content of the information SNMP-enabled devices can provide.

    • How it works: It specifies what kind of information can be retrieved from a device and how to interpret that information.

    • Key idea: Imagine MIB as a guide that tells you what each device is capable of telling you and how to understand the information it provides.

MIB Value
Description

1.3.6.1.2.1.25.1.6.0

System Processes

1.3.6.1.2.1.25.4.2.1.2

Running Programs

1.3.6.1.2.1.25.4.2.1.4

Processes Path

1.3.6.1.2.1.25.2.3.1.4

Storage Units

1.3.6.1.2.1.25.6.3.1.2

Software Name

1.3.6.1.4.1.77.1.2.25

User Accounts

1.3.6.1.2.1.6.13.1.3

TCP Local Ports

SNMP can be leveraged to gather information about a target network and its devices.

nmap

To scan for open SNMP ports (161), using -sU option to perform UDP scanning and the --open option to limit the output and display only open ports

kali@kali:~$ sudo nmap -sU --open -p 161 192.168.100.1-254 -oG open-snmp.txt

onesixtyone

onesixtyone brute forces an attack against a list of ips.

Check if the default community string "public" is valid on a target:

kali@kali:~$ onesixtyone -c public target_ip

snmpwalk

snmpwalk [APPLICATION OPTIONS] [COMMON OPTIONS] [OID]

Here's an example of using snmpwalk with a specific OID:

kali@kali:~$ snmpwalk -v 2c -c community_string target_ip 1.3.6.1.2.1.1
  • Replace community_string with a valid SNMP community string.

  • Replace target_ip with the IP address or hostname of the SNMP-enabled device.

  • The OID 1.3.6.1.2.1.1 corresponds to the SNMP MIB-II system group, which includes information about the system.

This command will perform an SNMP walk on the specified OID, displaying information related to the system group. You can replace the OID with any other valid OID to explore different parts of the SNMP tree and retrieve specific information.

Resources:

PreviousServer Message Block (SMB)NextSMTP

Last updated 1 year ago

πŸ‘¨β€πŸ«
πŸ”§
https://book.hacktricks.xyz/network-services-pentesting/pentesting-snmp
https://www.kali.org/tools/onesixtyone/
https://www.kali.org/tools/snmpcheck/
https://linux.die.net/man/1/snmpwalk