数学建模社区-数学中国

标题: 对中国先锋网络科技基于SNMP的信息刺探 [打印本页]

作者: 韩冰    时间: 2004-10-5 08:56
标题: 对中国先锋网络科技基于SNMP的信息刺探

作者: Net2k 来自:流星轨迹

6 ]1 S, I/ `% y7 U9 V+ K( T$ M

对中国先锋网络科技基于SNMP的信息刺探

2 Q' a0 J: A( K3 } Y7 x9 O" B g6 j $ q/ Z) O) O4 K* W

得到系统正在运行的程序信息:- q' w/ s+ U. t6 ]. ~+ J ------------------------------------------------------------ 7 F- X% o# K2 J7 t @) w! Z$ OVariable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1 % d7 T8 Y5 `# F0 }/ G; u( N* ^Value = String System Idle Process

% o, a$ _6 L' C3 x+ f( l. V$ f' s

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.8 ! ] \5 ?& v M+ q" D& C$ H; kValue = String System

, {8 X* O- t% L% N+ P: `" {& ]# _

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.172 ! n X: }7 l oValue = String smss.exe

8 m% k; z$ Y$ N! _! p& [

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.196 , J9 ]: {, A3 z; @+ Y! k7 jValue = String winlogon.exe

; `6 g: O5 M; m" I& P

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.200 0 E; Q- M3 J J8 eValue = String csrss.exe

7 B; M6 D: j4 h k) E# L" H( Z

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.248 # `/ T- h1 b) g" ~; ]Value = String services.exe

! L* k9 Z5 Z1 N9 k

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.260 0 g/ \0 _5 g, B) e# jValue = String lsass.exe

! H7 D- W H* w, m

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.296* o+ q& V3 _: L; [ Value = String wuauclt.exe

. b$ v+ m9 H. B. O4 A

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.456 . d( W/ v: f* S' s# G0 N5 hValue = String svchost.exe

; e0 |. _; s! m' X' m

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.496; Q' v5 |0 |( X2 F Value = String spoolsv.exe

: b; C' d1 X& L- A8 R

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.524 # Q7 r( ~' j) h2 Q7 S: ^Value = String msdtc.exe

|8 A% \) L+ ~, T# j

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.656: o% I% G+ h* i4 k$ y' w Value = String DefWatch.exe

# m! D, J5 z2 t

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.6768 e- l$ T! o, N+ g Value = String tcpsvcs.exe

' {9 ~. m- W( L+ Q& Q5 X

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.6926 I: x9 ^$ S1 L! A" v Value = String svchost.exe

% z0 D8 S; e2 X$ l L: Y

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.7201 R3 k% h. L, U1 W" e Value = String llssrv.exe

. z* F. a9 l4 t( }. } q

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.7640 Q0 ^# G. ]7 ?; V$ m& Y: g Value = String Rtvscan.exe

0 {3 K/ x; P7 S' A2 s6 O! W( j

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.872; k& |6 Q9 w4 ^ g- B Value = String hlds.exe

& E9 W* {, T1 [" X. [, M

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.924% i9 M: _% Y; ?$ ?9 _7 |+ i9 Q! t' A Value = String nvsvc32.exe

7 z- G( B4 {* q6 `) i4 N

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.992: {7 X0 `: |% {& R Value = String Explorer.EXE

& Z9 X7 M# ^2 w0 X# g, [$ r

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1000- E* s% U; X& t M! _" e Value = String regsvc.exe

/ j; I6 j9 D% A5 p* I

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.10323 |& b0 T: Z4 O |- M Value = String MSTask.exe

& e! ]( I# r- Q

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1072, T. F4 ?) y/ s" T Value = String snmp.exe

~2 {- [3 p0 n

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1092# R# B! F9 d7 X, X* R Value = String ServUDaemon.exe

# X( ?9 O' o6 v0 ?" m

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1104 . }; O/ p2 D; P! `1 X5 EValue = String SMAgent.exe

N) ?/ E6 j3 p) ^% ?7 R) p* f/ d

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1140 + T8 ?* J- R3 iValue = String WinMgmt.exe

! |4 \7 X7 b# o5 Y

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1164. p2 c/ p# ]1 z# i1 i4 V2 x Value = String wins.exe

) ^0 h9 k4 r8 [, d; f3 d

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1176; t# Z4 q& T& P4 @9 T ]# g4 k: V% d Value = String svchost.exe

& v! [# L" A9 L0 n% t

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1196 1 o6 g) F, c' \0 `! d% H: Y0 h7 R8 pValue = String xconfserver_t.e

$ E& d+ @9 `2 f7 F+ b

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1228 % f5 r% f2 T# L* A9 xValue = String Dfssvc.exe

6 O1 Y4 U( y: r% i. U* H7 q7 p; {$ k

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1248 + z* A' s# i5 L& E8 M7 h1 GValue = String inetinfo.exe

^7 T+ x' t/ H6 U- j0 U- Q. b% i

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1348 - T+ J+ V1 p+ k4 ]! TValue = String dns.exe

2 M$ N: j5 |; k: W* \

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1568 ' A/ c- R. Z3 n! {Value = String vptray.exe

8 i1 u7 a7 y. G0 u9 S

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1580 % x7 V% [" m! o% @# f; g! p2 X( `Value = String internat.exe

V2 j6 {# k. }" Z" d' c6 @

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1844 , n( H3 ^3 j+ E7 y& m4 GValue = String dllhost.exe

: K: A/ R8 H. l0 M' J

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1952 9 R8 }* v& K( cValue = String dllhost.exe

" }) o* P a4 i% o0 o- R6 }

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.2060 _9 e( w- d4 G) L Value = String mdm.exe

- ?, j) {+ o2 m/ b) L9 R0 P/ r

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.2144/ C2 C/ |' b) h Value = String conime.exe

9 ^: q8 A% s# U

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.2216# X9 p: W( j# t9 X( B Value = String hlds.exe

( R/ {1 ^& U' X

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.2336 8 N, ]6 k) R' N+ g \! l& j( SValue = String hlds.exe

5 n2 G8 I) ]; o+ O3 ~; s

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.2348! w- u) l4 ^* |3 @! { Value = String svchost.exe

1 n" s; u* E4 m% y

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.2424 t! A* T: A8 |" O7 p2 X5 vValue = String hlds.exe

* i; A7 }6 j0 S0 y# A& I: R- n

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.24603 H; x+ u" d8 h* C Value = String hlds.exe

; h; H8 [, u* G( E' [. ^ b5 j

End of MIB subtree. 9 r' K: O: J! _ k& H( e& Z------------------------------------------------------------

9 x' _7 d x, s0 |6 @* {

得到系统信息: : ^0 b9 {+ e6 C' ^+ S* w8 J$ \# z------------------------------------------------------------9 G2 y: \4 ]/ E# V+ T/ ? Variable = system.sysDescr.0 ' s% }6 a, y3 _/ hValue = String Hardware: x86 Family 15 Model 2 Stepping 9 AT/AT COMPATIBLE -0 t& I/ c2 S- t s9 o5 G# u Software: Windows 2000 Version 5.0 (Build 2195 Multiprocessor Free)

6 G9 R+ T1 o% W8 U6 k# \7 s- j& S+ d

Variable = system.sysObjectID.0 3 v- n y [$ M2 \3 ?8 qValue = ObjectID 1.3.6.1.4.1.311.1.1.3.1.2

3 x2 A$ R4 K8 v- l$ k3 a

Variable = system.sysUpTime.0( X) I( D8 T+ Z+ d+ m N Value = TimeTicks 24725698

! `. u8 ^, N2 ]- \% W

Variable = system.sysContact.03 g, t+ _( X" |7 d Value = String

/ c! ]* l0 t& H- f1 V0 k

Variable = system.sysName.0 ' G# j5 G- Q1 |# LValue = String XIAOTOU

' Z8 W5 p' ^5 k9 ~

Variable = system.sysLocation.0 2 h R( I( F* `: x8 H& \& M2 tValue = String

6 K2 P; V% X" K5 i3 G) r

Variable = system.sysServices.0 6 Q# D) u @0 q, o2 j" p xValue = Integer32 76

7 L; O! {0 u% F; o9 m- q

End of MIB subtree. + j$ Y9 \2 `6 `' q7 e, C2 k------------------------------------------------------------

6 b" A/ K" h9 h" p" c6 {

------------------------------------------------------------ 0 }. Q; x4 d8 @0 M5 N/ A关于snmputil的语法:/ n8 u# R H3 j4 c ------------------------------------------------------------ & V# Z$ L& A9 X" n* @get,就理解成获取一个信息。

. I! A+ v* K3 n

getnext,就理解成获取下一个信息。

: I4 p$ e6 Q$ w

walk,就理解成获取一堆信息(嗯,应该说所有数据库子树/子目录的信息)

4 r$ @8 W0 c _( P

agent,具体某台机器拉。

a% X- y% @. A5 Y: Z

community,嗯就是那个“community strings”“查询密码”拉。

) r' M1 V. b# _4 \

oid,这个要多说一下,这个呢,就是物件识别代码(Object Identifier)。8 W B/ {2 R+ o# _& l! A4 Y6 o. y g ............................................................

3 l5 a; [' n: ?

例: + i0 b! o/ [8 C- L- _; vsnmputil.exe walk 对方IP public .1.3.6.1.2.1.25.4.2.1.2 //**进程列表+ s; M5 H+ @, O$ o9 c snmputil.exe walk 对方IP public .1.3.6.1.4.77.1.2.25.1.1 //**用户列表; v4 ^: ?* o& ] snmputil.exe get 对方IP public .1.3.6.1.4.77.1.4.1.0 //**域名 - l8 u, [1 ^2 C, T( v/ G3 csnmputil.exe walk 对方IP public .1.3.6.1.2.1.25.6.3.1.2 //**安装的软件 ; e( v6 B% p- {, F& U# psnmputil.exe walk 对方IP public .1.3.6.1.2.1.1 //**系统信息






欢迎光临 数学建模社区-数学中国 (http://www.madio.net/) Powered by Discuz! X2.5