Post-Exploitation Phase
After successfully exploiting SNMP vulnerabilities, the post-exploitation phase focuses on maintaining access.
Critical Warning
The techniques described in this section are highly invasive and should only be performed on systems you have explicit permission to test.
1. Data Exfiltration
One of the primary goals of post-exploitation is to extract valuable data from the compromised system.
Extract configuration file contents using SNMP extensions
$ snmpwalk -v2c -c private 192.168.1.10 NET-SNMP-EXTEND-MIB::nsExtendOutput1Line.config
NET-SNMP-EXTEND-MIB::nsExtendOutput1Line.config = STRING: # Network configuration