πŸ’»
my_offsec_notes
  • Intro
  • Enumeration
    • Network Discovery
      • Arp
      • NetDiscover
      • TCPDump
    • DNS Enumeration
      • Find E-mail Addresses
      • Zone Transfer
    • Scanning
      • Nmap
        • FlaconSpy.py
        • NSE
      • AutoRecon
      • onetwopunch.sh
      • nc
      • Nikto Scan
      • Banner Grabbing
    • brute forcing the web
    • my recon cheat-sheet
      • Comman
    • Passive Enum
  • Starting web services
  • βš“Common Ports
    • TCP
      • Samba
        • Enumerating
        • Accessing
      • LDap
      • Domain (53)
      • NFS
      • MSRPC (135)
      • SMTP
      • MSRPC
      • FTP
        • BRUTE FORCING
      • KERBEROS (88)
      • POP3
      • RPC-BIND
      • SQL
        • MYSQL
          • My-SQL Root Access
          • Access
        • MS-SQL
          • Access
      • HTTP/HTTPS
        • WEB TECHNOLOGY
          • WORD-PRESS
          • DRUPAL
          • JOOMLA
          • WebDav
          • JENKINS
          • FLASK
          • PHP
          • J-BOSS
        • DIRECTORY/FILES FUZZING
        • LOGIN PAGE
        • TOMCAT
      • ORACLE (1521)
      • SSH
      • RDP (3389)
      • Redis
      • Rsync
      • Netbios (137)
      • Memcached (11211)
      • SSL (443)
      • Finger (79)
      • RPC (1024 to 5000)
    • ALL-ROUNDER
    • UDP
      • SNMP (161)
      • TFTP
  • PORT KNOCKING
  • ENUMERATING USERS
    • ENUM HASHES
  • Exploitation
    • Web Site Exploitation Vectors
      • LFI
        • Config Files
          • Linux
          • Windows
        • Some Useful
      • RFI
      • XXE
      • XSS
      • SQLi
        • NoSQL-Map
        • SQL-Map
      • SSTI
    • Accessing Target Machine
      • Windows
      • Linux
    • Exploits
  • Buffer Overflow
    • useful commands
    • Buffer Overflow Prep ("THM")
  • Creating Reverse Shells
    • Online Resources
    • Windows
    • Linux
    • Mac
    • Gifts for Web Pages
      • Scripting Languages
    • Common One liners
  • Active Directory
    • Enumeration
    • my A.D. Cheat-Sheet
    • After Getting D.C.
  • Priv-Esc
    • Windows
      • whoami /privs
      • Writable Service Executable
      • Cheat sheet
      • Unquoted Service Path
    • Linux
      • Cheat sheet
      • Cronjob
      • Docker (Group)
        • Docker GTFO
      • LXD (Group)
      • sudo+LD_PRELOAD
      • Mysql
        • MySQL (root access)
      • sudo<1.8.28
  • Break-Out Commands
    • Jailed SSH
    • Spawn a Bash shell for me
  • Password Attacks
  • PORT FORWARDING / TUNNELING
  • Post Exploitation
    • injecting Backdoors
  • Machines
    • Template
    • Hack The Box
      • Late
    • Try Hack Me
    • P.G. Grounds
    • Vuln-Hub
Powered by GitBook
On this page
  1. Common Ports
  2. UDP

SNMP (161)


===========================first thing first you need to install::
β†’ sudo apt install snmp-mibs-downloader
β†’ nano /etc/snmp/snmp.conf                                      [ and comment out the β€œmibs” line ]

===========================Getting information with snmpwalk::
###snmp check 
>>> snmp-check $IP -c public

>>> snmpwalk -c public -v2c $IP 
>>> snmpbulkwalk -Cr1000 -c public -v2c $IP . > snmpwalk.1								[ Best as per ippsec ]
>>> snmpenum $IP public linux.txt

>>> onesixtyone -c names -i hosts

===========================SMNP v3 :
>>> wget https://raw.githubusercontent.com/raesene/TestingScripts/master/snmpv3enum.rb; ./snmpv3enum.rb

===========================Enumerate Community strings : 

>>> ./onesixtyone -c /usr/share/seclists/Discovery/SNMP/common-snmp-community-strings.txt $IP
>>> python snmpbrute.py -t $IP
>>> nmap -sU  $IP -p161 --script=snmp-brute  -Pn --script-args snmp-brute.communitiesdb=list.txt


===========================Little-Bit Nmap Power : 

>>> nmap -sU -p161 --script "snmp-*" $IP
>>> nmap -n -vv -sV -sU -Pn -p 161,162 –script=snmp-processes,snmp-netstat $IP


===========================SNMPv3 enumeration : 

>>> wget https://raw.githubusercontent.com/raesene/TestingScripts/master/snmpv3enum.rb; ./snmpv3enum.rb

Wordlist
/usr/share/metasploit-framework/data/wordlists/snmp_default_pass.txt


===========================We need to know that there is a community called public : 

# enumerate windows users
>>> snmpwalk -c public -v1 $ip 1.3.6.1.4.1.77.1.2.25 


# enumerates running processes
>>> snmpwalk -c public -v1 $ip 1.3.6.1.2.1.25.4.2.1.2 


β†’ β†’ β†’ β†’ β†’ β†’ β†’ β†’ β†’ β†’ β†’ β†’ β†’ β†’ β†’ β†’ β†’ β†’ β†’ β†’ β†’ β†’ β†’ β†’ β†’ β†’ β†’ β†’ β†’ β†’ β†’ β†’ β†’ β†’ β†’ β†’ β†’ β†’ β†’ β†’ 

SNMP MIB Trees
1.3.6.1.2.1.25.1.6.0              - System Processes
1.3.6.1.2.1.25.4.2.1.2 			- Running Programs
1.3.6.1.2.1.25.4.2.1.4 			- Processes Path
1.3.6.1.2.1.25.2.3.1.4 			- Storage Units
1.3.6.1.2.1.25.6.3.1.2 			- Software Name
1.3.6.1.4.1.77.1.2.25 			- User Accounts
1.3.6.1.2.1.6.13.1.3 				- TCP Local Ports

← ← ← ← ← ← ← ← ← ← ← ← ← ← ← ← ← ← ← ← ← ← ← ← ← ← ← ← ← ← ← ← ← ← ← ← ← ← ← ← 


PreviousUDPNextTFTP

Last updated 2 years ago

βš“