The Simple Network Management Protocol (SNMP) is used on networked devices to read, write, and update device configuration remotely. SNMP sweeps are often a good indicator in finding a lot of information about a specific system, or actually compromising the remote device. In this recipe, we will learn to use the SNMP scanning module.
SNMP enumeration
Getting ready
Metasploit has a built-in auxiliary module specifically for sweeping SNMP devices. One must understand it before performing an attack. First, read-only and read-write community strings play an important role in the sort of information that can be mined or altered on the devices themselves. The Management Information Base (MIB) interface allows us to query the device and extract...