19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

134<br />

Part III: Hacking Network Hosts<br />

Figure 8-4:<br />

General<br />

SNMP<br />

information<br />

gathered by<br />

Getif.<br />

If SNMP is compromised, a hacker may be able to gather such network information<br />

as ARP tables, usernames, and TCP connections to attack your systems<br />

further. If SNMP shows up in port scans, you can bet that a malicious<br />

attacker will try to compromise the system.<br />

Here are some utilities for SNMP enumeration:<br />

✓ The commercial tools NetScanTools Pro and Essential NetTools<br />

✓ Free Windows GUI-based Getif<br />

✓ Free Windows text-based SNMPUTIL (www.wtcs.org/snmp4tpc/<br />

FILES/Tools/SNMPUTIL/SNMPUTIL.zip)<br />

You can use Getif to enumerate systems with SNMP enabled, as shown in<br />

Figure 8-4.<br />

In this test, I was able to glean a lot of information from a wireless access point,<br />

including model number, firmware revision, and system uptime. All this could<br />

be used against the host if an attacker wanted to exploit a known vulnerability<br />

in this particular system. By digging in further, I was able to discover several<br />

management interface usernames on this access point, as shown in Figure 8-5.<br />

You certainly don’t want to show the world this information.<br />

For a list of vendors and products affected by the well-known SNMP vulnerabilities,<br />

refer to www.cert.org/advisories/CA-2002-03.html.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!