In it we make active connections with the target system to get more information.
This information help us to gain access to the system (exploit).
Information to enumerate:
Techniques:
Using Email ID
Email ID contains username and domain name in it.
Using Default password
Using default settings,password and configuration of a device.
SNMP Enumeration
SNMP (Simple Network Management Protocol) is used for managing network devices.
It is used for collecting information from and configuring network devices such as servers, printers, hubs, switches, and routersCommunity strings are used to authenticate devices.
It uses UDP [Ports:161, 162 (Trap)]
Default community strings or guesses can be used to extract information about a device.
Information to enumerate:
Enmuerating SNMP in Metasploitable2
By default SNMP is disabled in Metasploitable2.
Enable SNMP in Metasploitable2
Edit /etc/default/snmpd
and change 127.0.0.1 to 0.0.0.0 and reboot it.
engineID
Every SNMPv3 device has its own ID(engineID). It is a unique number for every context that a agents operates in. But on most of the devices only one SNMP agent runs, so every device has a unique engineID.
snmpEngineTime/Boots
In SMPv3 to protect against replay attacks (when an attacker records the packets and sends it later again towards the destination) the manager first asks the agent how many times it rebooted already (snmpEngineBoots) and how long ago the last reboot was (snmpEngineTime) .The communication is encrypted.
It was able to find both the private community string (set to the default "private") and the public community string (set to the default as "public").
These community stings can then be used to grab information from the MIB about the target system.
sysDescr(system description) provides the description about the device being monitored.