Thinking...
[get complete service list]
Port Information
Protocol Service Name
tcp --- ---
Top IPs Scanning
Today Yesterday
194.180.49.186 (2)109.205.213.36 (14)
77.90.185.43 (1)194.180.49.217 (2)
50.116.44.176 (1)85.142.100.103 (2)
172.56.244.243 (1)77.90.185.235 (1)
77.90.185.52 (1)79.124.58.90 (1)
50.116.23.67 (1)161.35.56.30 (1)
45.142.193.74 (1)92.118.39.180 (1)
167.94.138.110 (1)97.107.139.94 (1)
109.205.213.27 (1)80.94.92.68 (1)
85.142.100.103 (1)79.124.62.122 (1)
User Comments
Submitted By Date
Comment
paul_s 2004-10-28 05:54:15
10264 Default community names of the SNMP Agent Category: SNMP Risk Level: High Dependencies: None Simple Network Management Protocol (SNMP) is a protocol which can be used by administrators to remotely manage a computer or network device. There are typically 2 modes of remote SNMP monitoring. These modes are roughly 'READ' and 'WRITE' (or PUBLIC and PRIVATE). If an attacker is able to guess a PUBLIC community string, they would be able to read SNMP data (depending on which MIBs are installed) from the remote device. This information might include system time, IP addresses, interfaces, processes running, etc. If an attacker is able to guess a PRIVATE community string (WRITE or 'writeall' access), they will have the ability to change information on the remote machine. This could be a huge security hole, enabling remote attackers to wreak complete havoc such as routing network traffic, initiating processes, etc. In essence, 'writeall' access will give the remote attacker full administrative rights over the remote machine. Risk factor : High More Information: http://www.securiteam.com/exploits/Windows_NT_s_SNMP_service_vulnerability.html
CVE Links
CVE # Description