UDP Port 161. Since its UDP its fast.Community Strings provide either Read or Read-Write permissions. Obviously we prefer RW.SNMP v1-v2 is clear text. v3 is encrypted.Here is the usual process taken to attack SNMP and the tools that will help you do it.
1) Obtain Community Strings
-Sniff clear text – Wireshark use the filter: udp port 161
-Guessing Community Strings – Onesixtyone, Metasploit (auxiliary/scanner/snmp/snmp_login), snmpblow
2) Setup TFTP Server
3) Identify Updating MIB : snmpwalk
4) Download Device Configs : snmpblow
5) Crack Enable Passwords (salted MD5) : John the Ripper , oclHashcat
6) Modify Config
7) Update Device Config : snmpset
You can see that these steps are pretty straight forward. Have fun experimenting with the tools. I would HIGHLY discourage attacking SNMP in a production environment unless you have thoroughly experimented with the process in a controlled lab.
Copy & Paste From :
No comments:
Post a Comment