SNMP 161
SNMP OIDs for Microsoft Windows Systems:
These Object Identifiers (OIDs) provide access to specific system information via SNMP:
System Processes:
1.3.6.1.2.1.25.1.6.0Enumerates system processes.
Running Programs:
1.3.6.1.2.1.25.4.2.1.2Lists running programs.
Processes Path:
1.3.6.1.2.1.25.4.2.1.4Provides paths for running processes.
Storage Units:
1.3.6.1.2.1.25.2.3.1.4Displays information about storage units.
Software Name:
1.3.6.1.2.1.25.6.3.1.2Lists installed software on the system.
User Accounts:
Enumerates user accounts.
TCP Local Ports:
Enumerates open TCP ports.
SNMP Enumeration Using Nmap:
Scan for open SNMP ports on a range of IPs:
This will scan for open SNMP (UDP port 161) across the IP range
10.11.1.1-254and output the results to theopen-snmp.txtfile.
Brute-forcing SNMP Community Strings with onesixtyone:
onesixtyone:Create a community string file with common values:
The above command adds common SNMP community strings (
public,private,manager) into a file calledcommunity.
Create a list of IPs to scan:
Run onesixtyone to brute-force SNMP on the created IP list:
SNMP Walk:
Enumerate various SNMP data points:
User accounts:
Running processes:
Open TCP ports:
Installed software:
SNMP Tools:
SNMPCheck (to enumerate SNMP details):
This tool checks and enumerates SNMP details of a target IP (
10.11.1.14).
SNMPEnum (may require installation):
Brute-force SNMP Users:
If you're using a wordlist for brute-forcing SNMP users:
Last updated