Carnivore - Predator
Formerly known as THC HackSuite, Carnivore - Predator stands at the forefront of cutting-edge cybersecurity tools, redefining the landscape of penetration testing with unparalleled innovation. Designed to empower ethical hackers, security professionals, and enthusiasts alike, Carnivore - Predator is the ultimate Pentest CMS that puts you in command.
current version: 0.7.0 - PREDATOR
home > documentation > modules > How to use THC xSNMP
This article explains how to effectively make use of THC xSNMP.
author: Remco Kouw
created: 04-May-2024
updated: 04-May-2024

THC xSNMP Introduction

This documentation details the functionality of the THC xSNMP (thc_sn) module.

THC xSNMP is a dictionary attack script designed to guess community strings to connect to an SNMP server.

Interface Parameters:

  1. SNMP Server Location: The host where the SNMP service is located.
  2. SNMP Version: Supports both versions 1 and 2.
  3. Wordlist: Dropdown menu containing wordlists from the Wordlists folder.

ModGlue Variables:

  1. $_CONTEXT['thc_sn']['log']: (string) Absolute path to the log file where successful community strings are stored.
  2. $_CONTEXT['thc_sn']['results']['result']: (boolean) Result of the brute-force attack (true if successful, false otherwise).
  3. $_CONTEXT['thc_sn']['results']['password']: (string) The correct password if the attack was successful.
  4. $_CONTEXT['thc_sn']['oid']: (string) Object identifier, static value SNMPv2-MIB::sysDescr.0 is used.
  5. $_CONTEXT['thc_sn']['version']: (int) Version of SNMP, either 1 or 2.
  6. $_CONTEXT['thc_sn']['host']: (string) Name of the host where the SNMP server is located.
  7. $_CONTEXT['thc_sn']['keys']: (array) Dump of successfully cracked community strings (applies to View Passes case only).
  8. $_CONTEXT['thc_sn']['wordlistname']: (string) Absolute path to the wordlist file in the Wordlists folder.
  9. $_CONTEXT['thc_sn']['wordlist']: (array) Content of the wordlist.
  10. $_CONTEXT['thc_sn']['loginattempts']: (int) Number of attempts made.
  11. $_CONTEXT['thc_sn']['result']: (boolean) Result of the brute-force attack.
  12. $_CONTEXT['thc_sn']['wordlistwords']: (int) Number of community strings used in the attack.
  13. $_CONTEXT['thc_sn']['communitypass']: (string) Current password without whitespace.
  14. $_CONTEXT['thc_sn']['connect']: (resource) Attempt to start SNMP session on the target host.
  15. $_CONTEXT['thc_sn']['writetext']: (string) Data entry for the log file when a password is guessed.
  16. $_CONTEXT['thc_sn']['data']: (string) Holds device information when data is successfully read.
  17. $_CONTEXT['thc_sn']['totaltime']: (int) Total execution time.
  18. $_CONTEXT['thc_sn']['resultstring']: (string) Result string sent to the user.

Resource Settings:

  • Time Limit: PHP default.
  • Memory Limit: PHP default.

Expanding THC xSNMP:

N/A

Dependencies:

SNMP

Known Issues:

This module uses dictionary attacks for brute-forcing, which can be resource-intensive. If you encounter time limit or memory issues, consider adjusting the module's settings.

Created by Remco Kouw: 2008-2024