Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Nmap NSE 6.01: snmp-brute

Information

Severity

Severity

High

Family

Family

Nmap NSE

CVSSv2 Base

CVSSv2 Base

7.5

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:P

Solution Type

Solution Type

Mitigation

Created

Created

11 years ago

Modified

Modified

5 years ago

Summary

Attempts to find an SNMP community string by brute force guessing. This script opens a sending socket and a sniffing pcap socket in parallel threads. The sending socket sends the SNMP probes with the community strings, while the pcap socket sniffs the network for an answer to the probes. If valid community strings are found, they are added to the creds database and reported in the output. The script takes the 'snmp-brute.communitiesdb' argument that allows the user to define the file that contains the community strings to be used. If not defined, the default wordlist used to bruteforce the SNMP community strings is 'nselib/data/snmpcommunities.lst'. In case this wordlist does not exist, the script falls back to 'nselib/data/passwords.lst' No output is reported if no valid account is found. SYNTAX: userdb: The filename of an alternate username database. snmpcommunity: The community string to use. If not given, it is ''public'', or whatever is passed to 'buildPacket'. passdb: The filename of an alternate password database. snmp-brute.communitiesdb: The filename of a list of community strings to try. unpwdb.passlimit: The maximum number of passwords 'passwords' will return (default unlimited). unpwdb.userlimit: The maximum number of usernames 'usernames' will return (default unlimited). unpwdb.timelimit: The maximum amount of time that any iterator will run before stopping. The value is in seconds by default and you can follow it with 'ms', 's', 'm', or 'h' for milliseconds, seconds, minutes, or hours. For example, 'unpwdb.timelimit=30m' or 'unpwdb.timelimit=.5h' for 30 minutes. The default depends on the timing template level (see the module description). Use the value '0' to disable the time limit.