Quantcast
Channel: BOT24
Viewing all articles
Browse latest Browse all 8064

Cisco-SNMP-Slap

$
0
0
cisco-snmp-slap utilises IP address spoofing in order to bypass an ACL
protecting an SNMP service on a Cisco IOS device.

Typically IP spoofing has limited use during real attacks outside DoS. Any TCP
service cannot complete the inital handshake. UDP packets are easier to spoof
but the return packet is often sent to the wrong address, which makes it
difficult to collect any information returned.

However if an attacker can guess the snmp rw community string and a valid source
address an attacker can set SNMP MiBs. One of the more obvious uses for this
is to have a Cisco SNMP service send its IOS configuration file to another
device.

This tool allows you to try one or more community strings against a Cisco device
from one or more IP addresses.

more here.........https://github.com/nccgroup/Cisco-SNMP-Slap

Viewing all articles
Browse latest Browse all 8064

Trending Articles