hacktricks/network-services-pentesting/pentesting-snmp/cisco-snmp.md

57 lines
4.4 KiB
Markdown
Raw Normal View History

2022-09-30 10:43:59 +00:00
# Cisco SNMP
<details>
2024-02-11 02:13:58 +00:00
<summary><strong>Jifunze kuhusu kudukua AWS kutoka sifuri hadi shujaa na</strong> <a href="https://training.hacktricks.xyz/courses/arte"><strong>htARTE (Mtaalam wa Timu Nyekundu ya AWS ya HackTricks)</strong></a><strong>!</strong></summary>
2022-09-30 10:43:59 +00:00
2024-02-11 02:13:58 +00:00
* Je, unafanya kazi katika **kampuni ya usalama wa mtandao**? Je, ungependa kuona **kampuni yako ikionekana katika HackTricks**? Au ungependa kupata ufikiaji wa **toleo jipya la PEASS au kupakua HackTricks kwa PDF**? Angalia [**MPANGO WA KUJIUNGA**](https://github.com/sponsors/carlospolop)!
* Gundua [**Familia ya PEASS**](https://opensea.io/collection/the-peass-family), mkusanyiko wetu wa kipekee wa [**NFTs**](https://opensea.io/collection/the-peass-family)
* Pata [**swag rasmi ya PEASS & HackTricks**](https://peass.creator-spring.com)
* **Jiunge na** [**💬**](https://emojipedia.org/speech-balloon/) [**Kikundi cha Discord**](https://discord.gg/hRep4RUj7f) au [**kikundi cha telegram**](https://t.me/peass) au **nifuatilie** kwenye **Twitter** 🐦[**@carlospolopm**](https://twitter.com/hacktricks_live)**.**
* **Shiriki mbinu zako za kudukua kwa kuwasilisha PRs kwenye [repo ya hacktricks](https://github.com/carlospolop/hacktricks) na [repo ya hacktricks-cloud](https://github.com/carlospolop/hacktricks-cloud)**.
2022-09-30 10:43:59 +00:00
</details>
2024-02-11 02:13:58 +00:00
# Kudukua Mitandao ya Cisco
2022-09-30 10:43:59 +00:00
2024-02-11 02:13:58 +00:00
**SNMP** inafanya kazi kupitia UDP na bandari 161/UDP kwa ujumbe wa kawaida na 162/UDP kwa ujumbe wa mtego. Itifaki hii inategemea herufi za jamii, zinazofanya kazi kama nywila ambazo huwezesha mawasiliano kati ya mawakala na seva za SNMP. Herufi hizi ni muhimu kwani zinaamua viwango vya ufikiaji, haswa **ruhusa za kusoma tu (RO) au kusoma na kuandika (RW)**. Moja ya njia muhimu za shambulio kwa wapima mitandao ni **kudukua herufi za jamii**, lengo likiwa kuingia kwenye vifaa vya mtandao.
2022-09-30 10:43:59 +00:00
2024-02-11 02:13:58 +00:00
Zana muhimu kwa kutekeleza mashambulio ya kudukua kama hayo ni **[onesixtyone](https://github.com/trailofbits/onesixtyone)**, ambayo inahitaji orodha ya herufi za jamii za uwezekano na anwani za IP za malengo:
2024-02-03 16:02:14 +00:00
```bash
onesixtyone -c communitystrings -i targets
2022-09-30 10:43:59 +00:00
```
2024-02-03 16:02:14 +00:00
### `cisco_config_tftp`
2022-09-30 10:43:59 +00:00
2024-02-11 02:13:58 +00:00
Kitabu cha Metasploit kina kipengele cha `cisco_config_tftp`, kinachorahisisha uchimbaji wa mazingira ya kifaa, kulingana na kupata kamba ya jamii ya RW. Vigezo muhimu kwa operesheni hii ni:
2022-09-30 10:43:59 +00:00
2024-02-11 02:13:58 +00:00
- Kamba ya jamii ya RW (**COMMUNITY**)
- IP ya mshambuliaji (**LHOST**)
- IP ya kifaa cha lengo (**RHOSTS**)
- Njia ya marudio kwa faili za mazingira (**OUTPUTDIR**)
2022-09-30 10:43:59 +00:00
2024-02-11 02:13:58 +00:00
Baada ya kusanidi, kipengele hiki kinawezesha kupakua mipangilio ya kifaa moja kwa moja kwenye folda iliyotajwa.
2022-09-30 10:43:59 +00:00
2024-02-03 16:02:14 +00:00
### `snmp_enum`
2022-09-30 10:43:59 +00:00
2024-02-11 02:13:58 +00:00
Kipengele kingine cha Metasploit, **`snmp_enum`**, kinajishughulisha na kukusanya habari za kina za vifaa vya ngumu. Kinafanya kazi na aina yoyote ya kamba ya jamii na inahitaji anwani ya IP ya lengo ili kutekeleza kwa mafanikio.
2022-09-30 10:43:59 +00:00
```bash
msf6 auxiliary(scanner/snmp/snmp_enum) > set COMMUNITY public
msf6 auxiliary(scanner/snmp/snmp_enum) > set RHOSTS 10.10.100.10
msf6 auxiliary(scanner/snmp/snmp_enum) > exploit
```
2024-02-11 02:13:58 +00:00
## Marejeo
2024-02-03 16:02:14 +00:00
* [https://medium.com/@in9uz/cisco-nightmare-pentesting-cisco-networks-like-a-devil-f4032eb437b9](https://medium.com/@in9uz/cisco-nightmare-pentesting-cisco-networks-like-a-devil-f4032eb437b9)
2022-09-30 10:43:59 +00:00
<details>
2024-02-11 02:13:58 +00:00
<summary><strong>Jifunze kuhusu kudukua AWS kutoka sifuri hadi shujaa na</strong> <a href="https://training.hacktricks.xyz/courses/arte"><strong>htARTE (Mtaalam wa Timu Nyekundu ya AWS ya HackTricks)</strong></a><strong>!</strong></summary>
2022-09-30 10:43:59 +00:00
2024-02-11 02:13:58 +00:00
* Je, unafanya kazi katika **kampuni ya usalama wa mtandao**? Je, ungependa kuona **kampuni yako ikionekana katika HackTricks**? Au ungependa kupata ufikiaji wa **toleo jipya zaidi la PEASS au kupakua HackTricks kwa muundo wa PDF**? Angalia [**MPANGO WA KUJIUNGA**](https://github.com/sponsors/carlospolop)!
* Gundua [**Familia ya PEASS**](https://opensea.io/collection/the-peass-family), mkusanyiko wetu wa [**NFTs**](https://opensea.io/collection/the-peass-family) za kipekee
* Pata [**swag rasmi ya PEASS & HackTricks**](https://peass.creator-spring.com)
* **Jiunge na** [**💬**](https://emojipedia.org/speech-balloon/) [**Kikundi cha Discord**](https://discord.gg/hRep4RUj7f) au [**kikundi cha telegram**](https://t.me/peass) au **nifuatilie** kwenye **Twitter** 🐦[**@carlospolopm**](https://twitter.com/hacktricks_live)**.**
* **Shiriki mbinu zako za kudukua kwa kuwasilisha PR kwenye repo ya [hacktricks](https://github.com/carlospolop/hacktricks) na [hacktricks-cloud](https://github.com/carlospolop/hacktricks-cloud)**.
2022-09-30 10:43:59 +00:00
</details>