# 2. SNMP Enumeration (Port 161,162)

## <mark style="color:red;">1. SNMP Enumeration using snmp-check</mark>

first scan the target to check open port

```
sudo nmap -sU -sV -p 161 192.168.18.110
```

Now enumerate it

```
snmp-check 192.168.18.110
```

## <mark style="color:red;">2. SNMP Enumeration with softperfect Network scanner</mark>

Windows.

{% embed url="<https://www.softperfect.com/products/networkscanner/>" %}

<figure><img src="https://2218819509-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FrUBnODuUX4EQ8P27uc5D%2Fuploads%2Fq3VgFMoMkVPgL32S9M3a%2Fimage.png?alt=media&#x26;token=1f0eedbc-b512-4bfb-b3da-0a8fe873189c" alt=""><figcaption></figcaption></figure>

## 3. Perform SNMP Enumeration using SnmpWalk

```
snmpwalk -v1 -c public 192.168.18.110
```

{% hint style="info" %}
-v1 is the version

-c is the string
{% endhint %}

<figure><img src="https://2218819509-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FrUBnODuUX4EQ8P27uc5D%2Fuploads%2FZcyS9yQ0GOE6rnd10Pb6%2Fimage.png?alt=media&#x26;token=d97612ba-17bc-4dc5-b64f-da5c5af9bc8b" alt=""><figcaption></figcaption></figure>

For snmp version 2,use the following command

```
snmpwalk -v2c -c public 192.168.18.110
```

<figure><img src="https://2218819509-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FrUBnODuUX4EQ8P27uc5D%2Fuploads%2FpW5t3U6M0suzX9MEqlFb%2Fimage.png?alt=media&#x26;token=af2618e0-c487-4f64-bb17-715493ade6f5" alt=""><figcaption></figcaption></figure>

## <mark style="color:red;">4. SNMP Enumeration using NMAP</mark>

```
sudo nmap -sU -P 161 --script snmp-sysdesc 192.168.18.110
sudo nmap -sU -P 161 --script snmp-processes 192.168.18.110
```

```
sudo nmap -sU -P 161 --script snmp-win32-software 192.168.18.110// List processes running on windows servers
```

```
sudo nmap -sU -P 161 --script snmp-interfaces 192.168.18.110
```

## <mark style="color:red;">5. Other SNMP enumeration Tools</mark>

```
nmap -sU -p 161 10.10.1.2
nmap -sU -p 161 --script=snmp-brute 10.10.1.2

# Expoilt SNMP with Metasploit
msfdb init && msfconsole ↵
use auxilary/scanner/snmp/snmp_login ↵
set RHOSTS 10.10.1.2 ↵
exploit ↵
  
use auxilary/scanner/snmp/snmp_enum ↵
set RHOSTS 10.10.1.2 ↵
exploit ↵
```

{% embed url="<https://www.udemy.com/course/ethical-hacker-practical/?referralCode=289CF01CF51246BCAD6C>" %}
