SNMP udp
Looking for string
┌──(kali㉿kali)-[~/pg/clamAV]
└─$ hydra -P /usr/share/seclists/Discovery/SNMP/common-snmp-community-strings.txt $clamav snmp
Hydra v9.5 (c) 2023 by van Hauser/THC & David Maciejak - Please do not use in military or secret service organizations, or for illegal purposes (this is non-binding, these *** ignore laws and ethics anyway).
Hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2024-12-29 15:14:37
[DATA] max 16 tasks per 1 server, overall 16 tasks, 118 login tries (l:1/p:118), ~8 tries per task
[DATA] attacking snmp://192.168.214.42:161/
[161][snmp] host: 192.168.214.42 password: public
[STATUS] attack finished for 192.168.214.42 (valid pair found)
1 of 1 target successfully completed, 1 valid password found
Hydra (https://github.com/vanhauser-thc/thc-hydra) finished at 2024-12-29 15:14:38
Found one string that is "public".

Searching for data in SNMP

Fetching all SNMP Data
From the process data, I found something very unusal.
Exploit Testing
On searching the web for exploits related to this. I found one on Exploit DB.
Although I am not sure about the version of the underlying system, I will run this.
After reading the exploit it is clear that this exploit is making a backdoor for use on the port 31337 .
First I will run the exploit and then i will connect to this port using netcat.

Now connecting to this port.
Got the connection.

Flag.txt

Last updated
Was this helpful?