SNMP 161

SNMP OIDs for Microsoft Windows Systems:

These Object Identifiers (OIDs) provide access to specific system information via SNMP:

System Processes:

1.3.6.1.2.1.25.1.6.0
  • Enumerates system processes.

Running Programs:

1.3.6.1.2.1.25.4.2.1.2
  • Lists running programs.

Processes Path:

1.3.6.1.2.1.25.4.2.1.4
  • Provides paths for running processes.

Storage Units:

1.3.6.1.2.1.25.2.3.1.4
  • Displays information about storage units.

Software Name:

1.3.6.1.2.1.25.6.3.1.2
  • Lists installed software on the system.

User Accounts:

  • Enumerates user accounts.

TCP Local Ports:

  • Enumerates open TCP ports.

SNMP Enumeration Using Nmap:

Scan for open SNMP ports on a range of IPs:

  • This will scan for open SNMP (UDP port 161) across the IP range 10.11.1.1-254 and output the results to the open-snmp.txt file.

Brute-forcing SNMP Community Strings with onesixtyone:

Create a community string file with common values:

  • The above command adds common SNMP community strings (public, private, manager) into a file called community.

Create a list of IPs to scan:

Run onesixtyone to brute-force SNMP on the created IP list:

SNMP Walk:

  • Enumerate various SNMP data points:

User accounts:

Running processes:

Open TCP ports:

Installed software:

SNMP Tools:

SNMPCheck (to enumerate SNMP details):

  • This tool checks and enumerates SNMP details of a target IP (10.11.1.14).

SNMPEnum (may require installation):

Brute-force SNMP Users:

  • If you're using a wordlist for brute-forcing SNMP users:

Last updated