SNMP udp

Looking for string

┌──(kali㉿kali)-[~/pg/clamAV]
└─$ hydra -P /usr/share/seclists/Discovery/SNMP/common-snmp-community-strings.txt $clamav snmp
Hydra v9.5 (c) 2023 by van Hauser/THC & David Maciejak - Please do not use in military or secret service organizations, or for illegal purposes (this is non-binding, these *** ignore laws and ethics anyway).

Hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2024-12-29 15:14:37
[DATA] max 16 tasks per 1 server, overall 16 tasks, 118 login tries (l:1/p:118), ~8 tries per task
[DATA] attacking snmp://192.168.214.42:161/
[161][snmp] host: 192.168.214.42   password: public
[STATUS] attack finished for 192.168.214.42 (valid pair found)
1 of 1 target successfully completed, 1 valid password found
Hydra (https://github.com/vanhauser-thc/thc-hydra) finished at 2024-12-29 15:14:38

Found one string that is "public".

Searching for data in SNMP

circle-info

Found nothing useful.

Fetching all SNMP Data

From the process data, I found something very unusal.

Exploit Testing

On searching the web for exploits related to this. I found one on Exploit DB.

Although I am not sure about the version of the underlying system, I will run this.

After reading the exploit it is clear that this exploit is making a backdoor for use on the port 31337 .

First I will run the exploit and then i will connect to this port using netcat.

Now connecting to this port.

Got the connection.

Flag.txt

Last updated

Was this helpful?