(161 UDP)SNMP
About
SNMP was created to monitor network devices. In addition, this protocol can also be used to handle configuration tasks and change settings remotely. SNMP-enabled hardware includes routers, switches, servers, IoT devices, and many other devices that can also be queried and controlled using this standard protocol. Thus, it is a protocol for monitoring and managing network devices.
It is important too note the the SNMP traps only happen if the device is configured to do so, and with no requests from the client.
SNMPv1: Basic version with no security (no authentication or encryption), suitable for small networks.
SNMPv2c: Added features but still insecure due to lack of encryption and use of community strings in plain text.
SNMPv3: Improved security with authentication and encryption, though it comes with increased configuration complexity.
Addressing Mechanism
Default Configuration
Dangerous Settings
rwuser noauth
Provides access to the full OID tree without authentication.
rwcommunity <community string> <IPv4 address>
Provides access to the full OID tree regardless of where the requests were sent from.
rwcommunity6 <community string> <IPv6 address>
Same access as with rwcommunity with the difference of using IPv6.
Footprinting
snmpwalk
The command below will return a list of SNMP OIDs (Object Identifiers) and their values, which represent the various data points the device is exposing.
We will need a community string and an SNMP version that does not support authentication!
If we do not have a community string:
onesixtyone
This tool brute forces the community strings using wordlists of our choice.
We can either create our custom wordlist or use one from SecLists (/SecLists/Discovery/SNMP/snmp.txt)
braa
As said in the documentation of this tool :
So in short, it's a tool to to brute-force the individual OIDs and enumerate the information behind them.
Last updated