- Carnivore - Predator
- Formerly known as THC HackSuite, Carnivore - Predator stands at the forefront of cutting-edge cybersecurity tools, redefining the landscape of penetration testing with unparalleled innovation. Designed to empower ethical hackers, security professionals, and enthusiasts alike, Carnivore - Predator is the ultimate Pentest CMS that puts you in command.
current version: 0.7.0 - PREDATOR
This article explains how to effectively make use of THC xSNMP.
author: Remco Kouw
created: 04-May-2024
updated: 04-May-2024
THC xSNMP Introduction
This documentation details the functionality of the THC xSNMP (thc_sn) module.
THC xSNMP is a dictionary attack script designed to guess community strings to connect to an SNMP server.
Interface Parameters:
- SNMP Server Location: The host where the SNMP service is located.
- SNMP Version: Supports both versions 1 and 2.
- Wordlist: Dropdown menu containing wordlists from the Wordlists folder.
ModGlue Variables:
- $_CONTEXT['thc_sn']['log']: (string) Absolute path to the log file where successful community strings are stored.
- $_CONTEXT['thc_sn']['results']['result']: (boolean) Result of the brute-force attack (true if successful, false otherwise).
- $_CONTEXT['thc_sn']['results']['password']: (string) The correct password if the attack was successful.
- $_CONTEXT['thc_sn']['oid']: (string) Object identifier, static value SNMPv2-MIB::sysDescr.0 is used.
- $_CONTEXT['thc_sn']['version']: (int) Version of SNMP, either 1 or 2.
- $_CONTEXT['thc_sn']['host']: (string) Name of the host where the SNMP server is located.
- $_CONTEXT['thc_sn']['keys']: (array) Dump of successfully cracked community strings (applies to View Passes case only).
- $_CONTEXT['thc_sn']['wordlistname']: (string) Absolute path to the wordlist file in the Wordlists folder.
- $_CONTEXT['thc_sn']['wordlist']: (array) Content of the wordlist.
- $_CONTEXT['thc_sn']['loginattempts']: (int) Number of attempts made.
- $_CONTEXT['thc_sn']['result']: (boolean) Result of the brute-force attack.
- $_CONTEXT['thc_sn']['wordlistwords']: (int) Number of community strings used in the attack.
- $_CONTEXT['thc_sn']['communitypass']: (string) Current password without whitespace.
- $_CONTEXT['thc_sn']['connect']: (resource) Attempt to start SNMP session on the target host.
- $_CONTEXT['thc_sn']['writetext']: (string) Data entry for the log file when a password is guessed.
- $_CONTEXT['thc_sn']['data']: (string) Holds device information when data is successfully read.
- $_CONTEXT['thc_sn']['totaltime']: (int) Total execution time.
- $_CONTEXT['thc_sn']['resultstring']: (string) Result string sent to the user.
Resource Settings:
- Time Limit: PHP default.
- Memory Limit: PHP default.
Expanding THC xSNMP:
N/A
Dependencies:
SNMP
Known Issues:
This module uses dictionary attacks for brute-forcing, which can be resource-intensive. If you encounter time limit or memory issues, consider adjusting the module's settings.
Created by Remco Kouw: 2008-2024