Exploitation Phase
After identifying vulnerabilities in the SNMP implementation, the next step is to exploit those vulnerabilities to gain unauthorized access or extract sensitive information.
Warning
The techniques described here should only be used on systems you have permission to test.
1. Exploiting Weak Community Strings
If weak or default community strings are discovered, they can be used to read or write SNMP information.
Retrieve system information using the 'public' community string
$ snmpwalk -v2c -c public 192.168.1.10 system
SNMPv2-MIB::sysDescr.0 = STRING: Linux server 3.10.0-1160.el7.x86_64