☕
My OSCP Journey: Tips, Tricks, and Cheat Sheets
  • Introduction
  • Network Scan
  • Services Exploitation
    • 21 - FTP
    • 25, 465, 587 - SMTP
    • 53 - DNS
    • 88 - Kerberos
    • 80, 443 - HTTP/S
    • 110, 995 - POP
    • 111 - NFS/RPC
    • 135, 593 - MSRPC
    • 139, 445 - SMB
    • 143, 993 - IMAP
    • 161 - SNMP
    • 389, 636, 3268, 3269 - LDAP
    • 3306 - Mysql
    • 5432 - Postgres
    • 27017 - MongoDB
  • Web Application Attacks
    • SQL Injection
    • File Inclusion Vulnerabilty
    • Command Injection
    • Client-Side Attacks
  • Brute Forcing
  • Privilege Escalation
    • Manual Enumeration
      • Windows Enumeration
      • Linux Enumeration
    • Windows Privesc
    • Linux Privesc
  • Active Directory
    • AD Manual Enumeration
    • AD Automatic Enumeration
    • AD Authentication
    • AD Lateral Movement
    • AD Attacking Kerberos
    • Hash Cracking Techniques
  • Transfer Files
    • Windows Downloads
    • Windows Uploads
  • Shells
    • Reverse/Bind Shells
    • Web Shells
Powered by GitBook
On this page
  • Enumeration
  • Windows SNMP Enumeration Example

Was this helpful?

Edit on GitHub
  1. Services Exploitation

161 - SNMP

Enumeration

The SNMP Management Information Base (MIB) is a database that typically contains network management information. The database is organized in a tree-like structure, where branches represent different organizations or network functions. The leaves of the tree (final endpoints) correspond to specific variable values that can be accessed and probed by an external user.

Scan for SNMP:

sudo nmap -sU --open -p 161 10.11.1.1-254 -oG open-snmp.txt

We can leverage a tool like onesixtyone to perform a brute force attack against a list of IP addresses.

onesixtyone -c wordlist.txt -i iplist.txt

After identifying SNMP services, we can initiate queries to extract specific MIB data that could be of interest.

Windows SNMP Enumeration Example

MIB Tree:

snmpwalk -c public -v1 -t 10 10.11.1.14

Windows users:

snmpwalk -c public -v1 10.11.1.14 1.3.6.1.4.1.77.1.2.25

Windows processes:

snmpwalk -c public -v1 10.11.1.73 1.3.6.1.2.1.25.4.2.1.2

Open TCP ports:

snmpwalk -c public -v1 10.11.1.14 1.3.6.1.2.1.6.13.1.3

Installed software:

snmpwalk -c public -v1 10.11.1.50 1.3.6.1.2.1.25.6.3.1.2

Previous143, 993 - IMAPNext389, 636, 3268, 3269 - LDAP

Last updated 2 years ago

Was this helpful?