Re: snmp

From: Mathias Wegner (mwegner@cs.oberlin.edu)
Date: Fri Sep 24 2004 - 10:41:34 EDT


> One of the sysadmins told me that they use in one of
> the networks Snmp and that the community is public.
>
> I want to pen test this issue meaning that I want to
> find ways to retrieve from the devices info, and show
> the IT manager that he must change the community.
>
> The reason that I want to do It my self is that I
> don't believe in the way that is just going to him and
> tell him..." its written in the internet that we must
> change public community to something else.
>
> So how or from where do I start ?

Are you looking for tools to use, or do you have the tools
and you're looking for where to start?

For tools, I would suggest a general snmp toolkit, such
as net-snmp (net-snmp.org)

For where to start, run snmpwalks against a representative
sample of network devices. Try walks against the enterprise
MIB and against the MIB-II internet MIB. That should tell
you a fair amount of topology information, device type &
firmware, as well as possibly vlan info, communities and
passwords. Then try writing to the system mib (eg, change
the hostname, system contact, or system location). If
they have write access allowed, you have a huge hole where
intruders could reconfigure network devices.

Mathias

-- 
I don't want the world, I just want your half.
------------------------------------------------------------------------------
Ethical Hacking at the InfoSec Institute. All of our class sizes are
guaranteed to be 12 students or less to facilitate one-on-one interaction
with one of our expert instructors. Check out our Advanced Hacking course,
learn to write exploits and attack security infrastructure. Attend a course
taught by an expert instructor with years of in-the-field pen testing
experience in our state of the art hacking lab. Master the skills of an
Ethical Hacker to better assess the security of your organization.
http://www.infosecinstitute.com/courses/ethical_hacking_training.html
-------------------------------------------------------------------------------


This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:06 EDT