This is Part 5 of the Router Hacking series. Please begin with Part 1 here, if you have not already done so.
In the previous videos, we had assumed that we already know the community string and then conduct the SNMP read attacks. In this video, we will look at how to use the SNMP Community Scanner module in Metasploit to launch a dictionary attack on the Vyatta router. Just to make the attack a little more interesting, we will use Wireshark to view and understand the attack traffic sent my Meatsploit and how the SNMP scanner works internally. The basic idea behind the SNMP scanner is to send SNMP Get-Request and Get-Next-Request packets to the victim with a community string set. The SNMP enabled device (Vyatta router in this case), will send back a reply for the packet with the right community string.
Tags: basics ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.