
Often the passwords themselves are level 7 encoded, which means they are trivial to decode and obtain the enable or login password for the specific device. If you can find a Cisco device running a private string for example, you can actually download the entire device configuration, modify it, and upload your own malicious config. SNMP sweeps are often good at finding a ton of information about a specific system or actually compromising the remote device. Security Operations for Beginners (SOC-100)Ĭontinuing with our information gathering, let’s take a look at SNMP Sweeping.Exploit Development Prerequisites (EXP-100).Perform the test from your Lansweeper server to the device, submit your SNMP credential and show us the entire test window. Screenshot of a connection test performed to the same Cisco device with devicetester.exe, which can be found in Program Files (x86)\Lansweeper\Actions on your Lansweeper server.Show us the following tabs: Summary, Errors (if it exists). Screenshots of the Lansweeper webpage of the Cisco device you tested.Program Files (x86)\Lansweeper\Service\Errorlog.txt, as present on your Lansweeper server.


Below is a copy of the response we sent via email, for anyone else interested.Ĭould you do the following to help us troubleshoot:

We received and answered this question via email as well.
