Skip to content

Commit f2401b6

Browse files
committed
Merge branch '3234-documentation' into develop
Issue #3234 PR #3339
2 parents 43b5b4b + 7e4e397 commit f2401b6

File tree

2 files changed

+18
-0
lines changed

2 files changed

+18
-0
lines changed
+17
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
---
2+
title: "SNMP"
3+
date: 2023-05-15T12:53:22+00:00
4+
draft: false
5+
tags: ["exploit", "linux"]
6+
---
7+
8+
The SNMP exploiter exploits [CVE-2020-15862](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15862).
9+
10+
11+
### Description
12+
13+
If a community is configured with read-write access, the machine is vulnerable to an attack using NET-SNMP-EXTEND-MIB to run arbitrary commands on the victim.
14+
15+
In versions 1 and 2c of the SNMP protocol the only means of authentication is the community string. In these versions of SNMP, community strings are sent as plaintext in all requests. Version 3 adds user-based authentication and encryption to the SNMP protocol.
16+
17+
This exploiter uses version 2c of the SNMP protocol. It brute-forces machines by using usernames and passwords provided by the user (see [configuration]({{< ref "/usage/configuration" >}}) for instructions) as SNMP community strings.

monkey/agent_plugins/exploiters/snmp/manifest.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -25,3 +25,4 @@ remediation_suggestion: >-
2525
stolen/configured credentials or community strings. This attack was
2626
possible because the version of Net-SNMP running on the server has not had
2727
security patches applied.
28+
link_to_documentation: https://techdocs.akamai.com/infection-monkey/docs/snmp

0 commit comments

Comments
 (0)