SNMP Pentest
Enumeration and Exploitation
Enumeration
Using snmpwalk
Retrieve SNMP information from the target device
Enumerate SNMPv2 with a community string of public
Search for installed software
Determine the amount of RAM on the host
Change an OID to a different value
Change the sysContact OID
Using nmap
Retrieve a list of all the running SNMP processes along with the associated ports
Retrieves information regarding SNMP server type and operating system details.
Retrieves a list of all the applications running on the target (windows) machine.
Using snmp-check
Exploitation
Last updated