CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutSign UpSign In
rapid7

Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.

GitHub Repository: rapid7/metasploit-framework
Path: blob/master/documentation/modules/post/windows/gather/enum_snmp.md
Views: 11788

Vulnerable Application

This module will enumerate the SNMP service configuration.

Verification Steps

  1. Start msfconsole

  2. Get a session

  3. Do: use post/windows/gather/enum_snmp

  4. Do: set SESSION <session id>

  5. Do: run

Options

Scenarios

Windows Server 2008 (x64)

msf6 > use post/windows/gather/enum_snmp msf6 post(windows/gather/enum_snmp) > set session 1 session => 1 msf6 post(windows/gather/enum_snmp) > run [*] Running module against WIN-17B09RRRJTG (192.168.200.218) [*] Checking if SNMP service is installed [*] SNMP is installed! [*] Enumerating community strings [*] [*] Community Strings [*] ================= [*] [*] Name Type [*] ---- ---- [*] secret READ & WRITE [*] test READ ONLY [*] [*] Enumerating Permitted Managers for Community Strings [*] SNMP packets are accepted from any host [*] Enumerating Trap configuration [*] Community Name: test [*] Destination: 127.0.0.1 [*] Destination: snmp.local [*] Post module execution completed