Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Docs: Add documentation for the SNMP exploiter #3339

Merged
merged 3 commits into from
May 15, 2023
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
17 changes: 17 additions & 0 deletions docs/content/reference/exploiters/SNMP.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
---
title: "SNMP"
date: 2023-05-15T12:53:22+00:00
draft: false
tags: ["exploit", "linux"]
---

The SNMP exploiter exploits [CVE-2020-15862](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15862).


### Description

If a community is configured with read-write access, the machine is vulnerable to an attack using NET-SNMP-EXTEND-MIB to run arbitrary commands on the victim.

In versions 1 and 2c of the SNMP protocol the only means of authentication is the community string. In these versions of SNMP, community strings are sent as plaintext in all requests. Version 3 adds user-based authentication and encryption to the SNMP protocol.

This exploiter uses version 2c of the SNMP protocol. It brute-forces machines by using usernames and passwords provided by the user (see [configuration]({{< ref "/usage/configuration" >}}) for instructions) as SNMP community strings.
1 change: 1 addition & 0 deletions monkey/agent_plugins/exploiters/snmp/manifest.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -25,3 +25,4 @@ remediation_suggestion: >-
stolen/configured credentials or community strings. This attack was
possible because the version of Net-SNMP running on the server has not had
security patches applied.
link_to_documentation: https://techdocs.akamai.com/infection-monkey/docs/snmp