SNMP 161
SNMP OIDs for Microsoft Windows Systems:
These Object Identifiers (OIDs) provide access to specific system information via SNMP:
System Processes:
Enumerates system processes.
Running Programs:
Lists running programs.
Processes Path:
Provides paths for running processes.
Storage Units:
Displays information about storage units.
Software Name:
Lists installed software on the system.
User Accounts:
Enumerates user accounts.
TCP Local Ports:
Enumerates open TCP ports.
SNMP Enumeration Using Nmap:
Scan for open SNMP ports on a range of IPs:
This will scan for open SNMP (UDP port 161) across the IP range
10.11.1.1-254
and output the results to theopen-snmp.txt
file.
Brute-forcing SNMP Community Strings with onesixtyone
:
onesixtyone
:Create a community string file with common values:
The above command adds common SNMP community strings (
public
,private
,manager
) into a file calledcommunity
.
Create a list of IPs to scan:
Run onesixtyone
to brute-force SNMP on the created IP list:
SNMP Walk:
Enumerate various SNMP data points:
User accounts:
Running processes:
Open TCP ports:
Installed software:
SNMP Tools:
SNMPCheck (to enumerate SNMP details):
This tool checks and enumerates SNMP details of a target IP (
10.11.1.14
).
SNMPEnum (may require installation):
Brute-force SNMP Users:
If you're using a wordlist for brute-forcing SNMP users:
Last updated