Security Testing for entities hosted in cloud

For the applications that are getting migrated to cloud / planned to be hosted in the cloud will need additional security considerations. Failure to ensure proper security protection when using cloud services may potentially result in higher costs and loss to business. Organizations must consider security controls for different services viz. Infrastructures as a service(Iaas), Software as a service (SaaS) or Platform as a service. Which applications should be moved to cloud?     ·         Low to Medium Risk What are the key security risks while hosting in cloud?     ·         Isolation Failure – Multi tenancy is a key thing in cloud. Failure in controls that separate the storage, memory, identity and access control and routing between tenants is a huge risk.     ·         Authentication and Authorization     ·...

SNMP Enumeration

SNMP has been my personal favourite protocol when it comes to enumeration. It stands for Simple Network Management Protocol. Ironically this is often mis-configured by many network administrators.
On the top of it - the commonly used versions of SNMP i.e. 1,2 and 2c does not provide encryption thus making it possible to sniff the configuration and credentials. SNMP is based on UDP and thus is also vulnerable to spoofing and replay attacks.

Many network devices support Read and Write of configurations over SNMP Private keys.

Scanning for SNMP open ports using nmap:

nmap -sU --open -p 161 <ip range> -oG snmp.txt

This will give you targets that have SNMP running.

It is important to understand and note the SNMP version your target is using. If the community string is incorrect, the device simply discards the request and does not respond. Note: SNMP Community strings are used only by devices which support SNMPv1 and SNMPv2c protocol. SNMPv3 uses username/password authentication, along with an encryption key.

 The community string acts like a password.

You can make use of a wordlist and a small script to try to brute force the community string.

A good list is available here

save this list by a name say snmp-community-string.txt

We have a tool called onesixtyone which checks for given community string(s) against the IP list.

usage: onesixtyone -c snmp-community-string.txt -i <ip / iprange>

Another very good tool is snmpwalk - I have had huge success with this tool in numerous penetration tests and CTFs

we need to know the community sting for running this.

Let's assume that it is 'public'

usage:

snmpwalk -c public -v1 <ip address>

Enumerate windows users: snmpwalk -c public -v1 <ip address> 1.3.6.1.4.1.77.1.2.25

Enumerating windows processes:snmpwalk -c public -v1 <ip address> 1.3.6.1.2.1.25.4.2.1.2

Enumerating Open TCP ports:  snmpwalk -c public -v1 <ip address> 1.3.6.1.2.1.6.13.1.3

Enumerating Installed softwares:  snmpwalk -c public -v1 <ip address> 1.3.6.1.2.1.25.6.3.1.2



Comments

Popular posts from this blog

Change the default SSH keys in Kali Linux ......One important step post installation

Security Testing for entities hosted in cloud

Keeping logs of your console commands during pentesting