当前位置:网站首页>web渗透测试----5、暴力破解漏洞--(2)SNMP密码破解
web渗透测试----5、暴力破解漏洞--(2)SNMP密码破解
2022-06-24 03:34:00 【七天啊】
简单网络管理协议(SNMP)是专门设计用于在 IP 网络管理网络节点(服务器、工作站、路由器、交换机及HUBS等)的一种标准协议,它是一种应用层协议。 SNMP 使网络管理员能够管理网络效能,发现并解决网络问题以及规划网络增长。通过 SNMP 接收随机消息(及事件报告)网络管理系统获知网络出现问题。默认UDP端口:161,162。
一、hydra
Hydra 是一个并行的登录破解器,它支持多种攻击协议。它非常快速和灵活,并且新模块很容易添加。kali工具集已集成。
hydra项目地址:
https://github.com/vanhauser-thc/thc-hydra/releases全版本
hydra支持:
Cisco AAA、Cisco auth、Cisco enable、CVS、FTP、HTTP(S)-FORM-GET、HTTP(S)-FORM-POST、HTTP(S)-GET、HTTP(S)-HEAD、HTTP-代理、ICQ、IMAP、IRC、LDAP、MS-SQL、MySQL、NNTP、Oracle 侦听器、Oracle SID、PC-Anywhere、PC-NFS、POP3、PostgreSQL、RDP、Rexec、Rlogin、Rsh、SIP、SMB(NT)、SMTP、SMTP 枚举、SNMP v1+v2+v3、SOCKS5、SSH(v1 和 v2)、SSHKEY、Subversion、Teamspeak (TS2)、Telnet、VMware-Auth、VNC 和 XMPP`。
hydra -P /root/Desktop/pass.txt IP snmp
-L:指定用户名字典路径-P:指定密码字典路径
二、Medusa
Medusa 是一个快速、并行和模块化的登录暴力破解器。目标是支持尽可能多的允许远程身份验证的服务。kalikali工具集已集成。
文档:
www.foofus.net/jmk/medusa/medusa.html
源代码:https://github.com/jmk-foofus/medusahttps://github.com/jmk-foofus/medusa/archive/2.2.tar.gz
主要功能如下:
1、基于线程的并行测试:可以同时针对多个主机、用户或密码执行蛮力测试。
2、灵活的用户输入:可以通过多种方式指定目标信息(主机/用户/密码)。例如,每个项目可以是单个条目,也可以是包含多个条目的文件。此外,组合文件格式允许用户细化他们的目标列表。
3、模块化设计:每个服务模块作为一个独立的 .mod 文件存在。这意味着无需对核心应用程序进行任何修改即可扩展支持的服务列表以进行暴力破解。
4、支持多种协议:当前支持许多服务(例如 SMB、HTTP、POP3、MS-SQL、SSHv2 等)。
medusa -M snmp -h IP –u ignite -P /root/Desktop/pass.txt
-U:表示用户名列表的路径-P:表示密码列表的路径-M:指定爆破参数类型
三、Metasploit
use auxiliary/scanner/snmp/snmp_login
msf auxiliary(scanner/snmp/snmp_login)> set rhosts IP
msf auxiliary(scanner/snmp/snmp_login)> set pass_file /root/Desktop/pass.txt
msf auxiliary(scanner/snmp/snmp_login)> set stop_on_success true
msf auxiliary(scanner/snmp/snmp_login)> run
四、NMAP
nmap -sU –p 161 –n --script snmp-brute IP --script-args snmp-brute.communitiesdb=/root/Desktop/pass.txt
-sU:SNMP消息传输通过UDP进行,通常使用UDP端口号161/162-p:指定端口号161-n:不做DNS解析--script snmp-brute:指定使用snmp-brute脚本进行扫描--script-args:指定脚本参数snmp-brute.communitiesdb:该脚本采用snmp-brute.communitiesdb允许用户定义包含要使用的社区字符串的文件的参数。如果未定义,用于暴力破解 SNMP 社区字符串的默认单词列表是nselib/data/snmpcommunities.lst。如果此词表不存在,则脚本回退到 nselib/data/passwords.lst。如果没有找到有效帐户,则不报告输出。
示例用法:
nmap -sU --script snmp-brute <目标> [--script-args snmp-brute.communitiesdb=<wordlist> ]
五、onesixtyone
oneixtyone 对 SNMP 扫描采用了不同的方法。它利用了 SNMP 是一种无连接协议这一事实,并尽可能快地发送所有 SNMP 请求。然后扫描器等待响应返回并记录它们,其方式类似于 Nmap ping 扫描。
项目地址:
https://github.com/trailofbits/onesixtyone
kali已集成该工具。
oneixtyone IP -c /root/Desktop/pass.txt
边栏推荐
- What is the role of the distributed configuration center? What are the advantages of a distributed configuration center?
- How does cloud computing achieve elastic scaling? What are the characteristics of elasticity?
- Dry goods how to build a data visualization project from scratch?
- Using RDM (Remote Desktop Manager) to import CSV batch remote
- Grpc: how to add API Prometheus monitoring interceptors / Middleware?
- New Google brain research: how does reinforcement learning learn to observe with sound?
- RI Geng series: write a simple shell script, but it seems to have technical content
- [new double 11] the latest interpretation of Tencent cloud double 11! Get 11000 yuan voucher now!!
- Ar 3D map technology
- The server size of the cloud desktop. The cloud desktop faces the server configuration requirements
猜你喜欢
![[summary of interview questions] zj6 redis](/img/4b/eadf66ca8d834f049f3546d348fa32.jpg)
[summary of interview questions] zj6 redis

Simple and beautiful weather code

Get to know MySQL database

Sorting out of key vulnerabilities identified by CMS in the peripheral management of red team (I)

Ar 3D map technology

Community pycharm installation visual database
![[summary of interview questions] zj5](/img/d8/ece82f8b2479adb948ba706f6f5039.jpg)
[summary of interview questions] zj5

QT creator tips

On Sunday, I rolled up the uni app "uview excellent UI framework"
随机推荐
What are the configuration requirements for cloud desktop servers? What are the main characteristics of the three points?
Disk partition extension using graphical interface and PowerShell code
Windowsvpn client is coveted by vulnerabilities, 53% of companies face supply chain attacks | global network security hotspot
Tencent cloud CIF engineering efficiency summit ends perfectly
How to solve the problem of easycvr playing the total recording time in the specified time period?
[new double 11] the latest interpretation of Tencent cloud double 11! Get 11000 yuan voucher now!!
Troubleshooting and resolution of errors in easycvr calling batch deletion interface
Why do I need a code signing certificate? Where can I get a code signing certificate?
What is the price of the elastic public network IP bandwidth
Record the creation process of a joke widget (I)
[competition experience sharing] design of intelligent guide rod
What is the principle of intelligent image recognition? What are the applications of intelligent image recognition?
Grpc: how do I start multiple ports?
Grpc: how to reasonably manage log configuration?
Differences between EDI and VMI
What protocol does FTP belong to in Fortress machine and how to use FTP in Fortress machine
Tencent cloud CIF engineering effectiveness summit was successfully opened, and coding released a series of new products
What is the difference between elasticity and scalability of cloud computing? What does elastic scaling of cloud computing mean?
RI Geng series: write a simple shell script, but it seems to have technical content
The server size of the cloud desktop. The cloud desktop faces the server configuration requirements