Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.803542
Kategorie:Nmap NSE
Titel:Nmap NSE 6.01: snmp-brute
Zusammenfassung:Attempts to find an SNMP community string by brute force guessing.;;This script opens a sending socket and a sniffing pcap socket in parallel threads. The sending;socket sends the SNMP probes with the community strings, while the pcap socket sniffs the network;for an answer to the probes. If valid community strings are found, they are added to the creds;database and reported in the output.;;The script takes the 'snmp-brute.communitiesdb' argument that allows the user to define;the file that contains the community strings to be used. If not defined, the default wordlist used;to bruteforce the SNMP community strings is 'nselib/data/snmpcommunities.lst'. In case;this wordlist does not exist, the script falls back to 'nselib/data/passwords.lst';;No output is reported if no valid account is found.;;SYNTAX:;;userdb: The filename of an alternate username database.;;snmpcommunity: The community string to use. If not given, it is;''public'', or whatever is passed to 'buildPacket'.;;passdb: The filename of an alternate password database.;;snmp-brute.communitiesdb: The filename of a list of community strings to try.;;unpwdb.passlimit: The maximum number of passwords;'passwords' will return (default unlimited).;;unpwdb.userlimit: The maximum number of usernames;'usernames' will return (default unlimited).;;unpwdb.timelimit: The maximum amount of time that any iterator will run;before stopping. The value is in seconds by default and you can follow it;with 'ms', 's', 'm', or 'h' for;milliseconds, seconds, minutes, or hours. For example,;'unpwdb.timelimit=30m' or 'unpwdb.timelimit=.5h' for;30 minutes. The default depends on the timing template level (see the module;description). Use the value '0' to disable the time limit.
Beschreibung:Summary:
Attempts to find an SNMP community string by brute force guessing.

This script opens a sending socket and a sniffing pcap socket in parallel threads. The sending
socket sends the SNMP probes with the community strings, while the pcap socket sniffs the network
for an answer to the probes. If valid community strings are found, they are added to the creds
database and reported in the output.

The script takes the 'snmp-brute.communitiesdb' argument that allows the user to define
the file that contains the community strings to be used. If not defined, the default wordlist used
to bruteforce the SNMP community strings is 'nselib/data/snmpcommunities.lst'. In case
this wordlist does not exist, the script falls back to 'nselib/data/passwords.lst'

No output is reported if no valid account is found.

SYNTAX:

userdb: The filename of an alternate username database.

snmpcommunity: The community string to use. If not given, it is
''public'', or whatever is passed to 'buildPacket'.

passdb: The filename of an alternate password database.

snmp-brute.communitiesdb: The filename of a list of community strings to try.

unpwdb.passlimit: The maximum number of passwords
'passwords' will return (default unlimited).

unpwdb.userlimit: The maximum number of usernames
'usernames' will return (default unlimited).

unpwdb.timelimit: The maximum amount of time that any iterator will run
before stopping. The value is in seconds by default and you can follow it
with 'ms', 's', 'm', or 'h' for
milliseconds, seconds, minutes, or hours. For example,
'unpwdb.timelimit=30m' or 'unpwdb.timelimit=.5h' for
30 minutes. The default depends on the timing template level (see the module
description). Use the value '0' to disable the time limit.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

CopyrightCopyright (C) 2013 NSE-Script: The Nmap Security Scanner; NASL-Wrapper: Greenbone Networks GmbH

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.