OSCP Cheatsheet
  • Reference List
  • Basic
  • Methodology
    • Basic Scans
    • Service Enumeration
      • TCP: HTTP(S) - 80 / 443
      • TCP: SMB - 139 / 445
      • TCP: FTP - 21
      • TCP/UDP: DNS - 53
      • TCP: SSH - 22
      • TCP/UDP: LDAP - 389 / 636 / 3268
      • TCP/UDP: Kerberos - 88
      • UDP: SNMP - 161
      • TCP: SMTP - 25
      • TCP: RDP - 3389
      • TCP: RPC - 135 / 593
      • TCP: Evil-WinRM - 5985 / 5986
      • TCP: MYSQL - 3306
      • TCP: MSSQL - 1433
      • TCP: Confluence - 8090
    • Extras
  • File Transfer
  • KeePass Database
  • Shells
  • Enumeration
    • Linux
    • Windows
    • Git
  • Privilege Escalation
    • Linux
      • Abusing Cron Jobs
      • Abusing Password Authentication
      • Abusing Setuid Binaries and Capabilities
      • Abusing Sudo
      • Exploits
    • Windows
      • Service Binary Hijacking
      • DLL Hijacking
      • Unquoted Service Paths
      • Scheduled Tasks
      • Exploits
  • Port Forwarding
    • Linux
    • Windows
  • Attacks
    • Public Exploits
    • User Creation
    • Password Cracking
      • Custom Rules
      • Custom Password List
    • Phishing
    • SQLi
  • Active Directory
    • Enumeration
    • Attack
    • Lateral Movement
    • Persistence
Powered by GitBook
On this page
  • Information
  • Enumeration
  • Nmap
  • onesixtyone
  • snmpwalk
  1. Methodology
  2. Service Enumeration

UDP: SNMP - 161

Information

MIB Values
MIB

1.3.6.1.2.1.25.1.6.0

System Processes

1.3.6.1.2.1.25.4.2.1.2

Running Programs

1.3.6.1.2.1.25.4.2.1.4

Processes Path

1.3.6.1.2.1.25.2.3.1.4

Storage Units

1.3.6.1.2.1.25.6.3.1.2

Software Name

1.3.6.1.4.1.77.1.2.25

User Accounts

1.3.6.1.2.1.6.13.1.3

TCP Local Ports

Enumeration

Nmap

sudo nmap -sU --open -p 161 <Target IP Address>

onesixtyone

onesixtyone -c community -i ips

NOTE: Prepare the following things

  • Community

echo public > community && echo private >> community && echo manager >> community
  • ips

for ip in $(seq 1 254); do echo <Target IP Address>.$ip; done > ips

snmpwalk

Leak command output

snmpwalk -c public -v2c <Target IP Address> NET-SNMP-EXTEND-MIB::nsExtendOutputFull
snmpwalk -c community -v2c <Target IP Address> NET-SNMP-EXTEND-MIB::nsExtendOutputFull

Increase timeout timing

snmpwalk -c public -v2c -t 10 <Target IP Address>

Enumerate Logged-In Users

snmpwalk -c public -v2c <Target IP Address> 1.3.6.1.4.1.77.1.2.25

Enumerate Running Processes

snmpwalk -c public -v2c <Target IP Address> 1.3.6.1.2.1.25.4.2.1.2

Enumerate Active TCP Connections

snmpwalk -c public -v2c <Target IP Address> 1.3.6.1.2.1.6.13.1.3
PreviousTCP/UDP: Kerberos - 88NextTCP: SMTP - 25

Last updated 22 days ago