QQ登录

只需要一步,快速开始

 注册地址  找回密码
查看: 2622|回复: 0
打印 上一主题 下一主题

对中国先锋网络科技基于SNMP的信息刺探

[复制链接]
字体大小: 正常 放大
韩冰        

823

主题

3

听众

4048

积分

我的地盘我做主

该用户从未签到

发帖功臣 元老勋章

跳转到指定楼层
1#
发表于 2004-10-5 08:56 |只看该作者 |倒序浏览
|招呼Ta 关注Ta

作者: Net2k 来自:流星轨迹

4 h0 o4 ^" P0 Z

对中国先锋网络科技基于SNMP的信息刺探

+ ]7 C# K+ `0 x0 l- F/ m $ q( P& H9 C+ z' ?. f& q0 u2 P% [! }8 ~7 r8 G- ]

得到系统正在运行的程序信息: ! C$ n* ?1 _7 b. N! c. b------------------------------------------------------------ " s+ ~1 c& G+ j! S( l4 ~Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1. V3 H o$ k: l, a5 W' k* _% h Value = String System Idle Process

/ J6 \: H6 L7 g. f! p

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.8' k7 _) |% ~3 g0 Y% L. p. O! w Value = String System

, ?# K0 }* i! f! _! S# U. `

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.172% g; O3 c4 s$ O4 Z G2 m$ @- W Value = String smss.exe

# Y" @ ^3 J# x6 b( `, Z

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.196 . S, j2 j. V; Q6 l0 @3 R) MValue = String winlogon.exe

* \* o3 f. O# o& m6 O2 f$ f/ W

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.200/ e& q7 J/ C; ^4 X Value = String csrss.exe

: p ~' P$ e/ C. _; w

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.248 2 K1 ^6 z5 E, }) e: i J6 | o3 b( {Value = String services.exe

0 t+ m1 F' U* x! U- ^8 G" C

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.260 % w, d" V$ u+ y7 r) d( wValue = String lsass.exe

, c) r9 d u+ |5 \2 \3 B4 J

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.296% c6 S. U7 c4 A Value = String wuauclt.exe

3 q5 l8 V' I I, y% s

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.4569 S0 q% I6 K& V. V; }. s4 N Value = String svchost.exe

# \1 T! {3 f @' s+ m& h) H0 K

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.496 8 t }( y/ {/ _! f/ r' YValue = String spoolsv.exe

$ | M' C8 }, q U5 Q+ g. J% D6 v

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.524: w: V7 v& z, S }7 J( n% z Value = String msdtc.exe

+ B' _) s1 P# ]4 N

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.656 $ M' x9 E0 l3 o8 [$ D: KValue = String DefWatch.exe

4 j/ e7 L; o: R0 z4 A

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.6763 a. R V ^- K: `8 t Value = String tcpsvcs.exe

0 g9 g& V- [$ R/ b9 K

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.692 # D/ x* l/ i3 P& h/ L& [3 }8 pValue = String svchost.exe

6 `( V& ~; J: G( c: _& k

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.720 $ i& G! A* P- R& b* C4 J3 q9 u: o! {Value = String llssrv.exe

* S3 h% j9 R$ O" ?: W5 V4 ^

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.764 ; x% I$ [: t4 U" @Value = String Rtvscan.exe

& P8 v# A( k! D+ a9 l8 l

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.8721 P+ Z$ U7 m8 Y- f Value = String hlds.exe

. ]9 |# P0 R. B* \/ N

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.9249 O: m/ @6 x/ T$ ^ Value = String nvsvc32.exe

2 Z& \2 \- [$ G7 ]( E# n+ U

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.992. Z8 g, F( e f# ^# T5 g* D Value = String Explorer.EXE

3 j) K# L0 B, ?2 v( R' F6 w/ L

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1000 2 f, n! r" `4 o1 _% e }4 LValue = String regsvc.exe

}7 `4 f( r7 D$ ~) M3 S

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1032! _! |$ h$ w+ B6 \ Value = String MSTask.exe

4 L S( T9 r2 Z( ^

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.10723 y, w# T' s: K$ F1 {0 A Value = String snmp.exe

7 k1 V! w5 ^( A( }) B% y, u

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1092 6 S2 C$ q( G8 q, ~Value = String ServUDaemon.exe

7 M) h4 V4 V1 Q+ V7 H# i+ e1 s

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.11044 b' ^- k! _% L0 U& k7 B% a Value = String SMAgent.exe

& {4 i9 \# U( f; ^) n

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1140 ! `" W3 s) j/ v CValue = String WinMgmt.exe

$ n. T- A( `2 U- a9 v

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1164 0 d o. T& X0 C% S, Q, }Value = String wins.exe

; t8 r' ~+ d& l. [ `

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1176 . e- S. O9 P v. X0 P, G+ `4 I/ QValue = String svchost.exe

& L/ g- P O$ B$ S- E

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.11968 S u2 g* \, X, J9 Q8 c: p Value = String xconfserver_t.e

6 B8 m3 O7 ?" b; J6 K

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.12284 p: _% o; P; u) Y3 S Value = String Dfssvc.exe

' q, @2 C8 j1 N; K% \- G" ?% |3 J

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1248 6 C7 H2 a$ T9 R$ U' F% b1 uValue = String inetinfo.exe

. D0 K( ?; z$ P2 c6 b! i) g( e- G

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.13486 t2 F0 G; i- l5 } Value = String dns.exe

0 _, v8 T, p9 n; U

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1568 $ p! J" _% h- I/ p4 X- d& G, sValue = String vptray.exe

! K+ d( H5 p; p4 q0 k) _6 @

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1580 A) m: r" W( T3 N( R m Value = String internat.exe

+ m/ ^ O: @5 |) W5 N) |

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1844 4 \+ Y, C( @7 e; B! q5 A- N5 mValue = String dllhost.exe

0 a9 q) e% W2 t! h q

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1952# t& w& {' D7 c) y3 s Value = String dllhost.exe

- k7 B4 {! U' w9 |- x# Y/ a

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.2060 # k, @4 r& i4 a/ ^* h8 WValue = String mdm.exe

- w" J) Z i! j$ _" k

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.2144. b# H- P& n% s) V Value = String conime.exe

3 V5 W" n* P$ |

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.2216 3 m7 |8 o" ~, n$ G# `9 O7 OValue = String hlds.exe

# `, e ~( Q% m# [5 C) \ u

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.2336 6 C ?/ P; R" n, g' w mValue = String hlds.exe

8 o$ j3 w: o4 f3 e* ^: h" a" ~

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.2348+ A/ i% {6 a( A, p Value = String svchost.exe

6 n; ]2 I# l( |9 v

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.2424 ) G8 A8 K! o# y/ UValue = String hlds.exe

/ Z% W. g- c- b, w$ F9 M' R8 [5 x

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.2460 0 a5 n2 x. B2 GValue = String hlds.exe

" G, q/ c, F, j* K4 p2 U

End of MIB subtree.# E5 D! W2 z# D- @! n' k ------------------------------------------------------------

; r& N( ?! j( I

得到系统信息: : O) l. g( d7 x% X* i------------------------------------------------------------) F. _5 e! g3 D s1 J! W Variable = system.sysDescr.0 1 g, G5 Y# @7 E% T6 W% Z/ g0 J# eValue = String Hardware: x86 Family 15 Model 2 Stepping 9 AT/AT COMPATIBLE -9 | V+ }$ \3 V Software: Windows 2000 Version 5.0 (Build 2195 Multiprocessor Free)

, S" @5 H$ k: x4 M

Variable = system.sysObjectID.00 Q- n/ K% k; q Value = ObjectID 1.3.6.1.4.1.311.1.1.3.1.2

1 N) q! a, `* B

Variable = system.sysUpTime.08 r& z: H/ t3 I: _" C( ]4 G Value = TimeTicks 24725698

, }7 r% Z8 r/ X7 S+ ?1 p% w) v

Variable = system.sysContact.0 : t G- x# D" v9 PValue = String

, U! V9 e1 \, y9 g+ f. v

Variable = system.sysName.0( x- R; M& _7 _. o6 w Value = String XIAOTOU

6 E4 p( {$ o5 y8 ^+ C

Variable = system.sysLocation.0 3 {4 z. F5 M5 z$ w( YValue = String

% v/ y) |! y: a5 [# X: [, }. e

Variable = system.sysServices.0 + Z+ s( h g& _Value = Integer32 76

( c& n5 R* I. s8 K4 G0 q

End of MIB subtree.- `% C( _& W& V4 d A! N ------------------------------------------------------------

2 e% M/ Q4 H+ W) {

------------------------------------------------------------ 5 E6 x5 N+ ~; a( c关于snmputil的语法: , |/ C/ h) N8 k& Y+ C------------------------------------------------------------ ; k5 g* ^( }. c) Kget,就理解成获取一个信息。

1 ^, _- R% t/ ]& G2 T

getnext,就理解成获取下一个信息。

$ }3 y2 t1 t0 r

walk,就理解成获取一堆信息(嗯,应该说所有数据库子树/子目录的信息)

# k$ f0 H$ x2 e h" G0 p4 N3 t

agent,具体某台机器拉。

o- z5 c& |6 _' _, W

community,嗯就是那个“community strings”“查询密码”拉。

4 c9 {7 Y: S$ f

oid,这个要多说一下,这个呢,就是物件识别代码(Object Identifier)。: y2 `+ N& ]; p3 Q/ k w ............................................................

J2 I3 ?0 W7 i3 M% y+ P

例:, M) z8 f, z% k* [. l1 P snmputil.exe walk 对方IP public .1.3.6.1.2.1.25.4.2.1.2 //**进程列表 : K: b$ x& b( X# t0 T7 `snmputil.exe walk 对方IP public .1.3.6.1.4.77.1.2.25.1.1 //**用户列表 R( x# t& F5 y& Q0 }+ P7 [ snmputil.exe get 对方IP public .1.3.6.1.4.77.1.4.1.0 //**域名( q. O7 I* ^1 G. m! h0 j, s7 t snmputil.exe walk 对方IP public .1.3.6.1.2.1.25.6.3.1.2 //**安装的软件1 \+ ]8 E7 O- L# E snmputil.exe walk 对方IP public .1.3.6.1.2.1.1 //**系统信息

zan
转播转播0 分享淘帖0 分享分享0 收藏收藏0 支持支持0 反对反对0 微信微信
您需要登录后才可以回帖 登录 | 注册地址

qq
收缩
  • 电话咨询

  • 04714969085
fastpost

关于我们| 联系我们| 诚征英才| 对外合作| 产品服务| QQ

手机版|Archiver| |繁體中文 手机客户端  

蒙公网安备 15010502000194号

Powered by Discuz! X2.5   © 2001-2013 数学建模网-数学中国 ( 蒙ICP备14002410号-3 蒙BBS备-0002号 )     论坛法律顾问:王兆丰

GMT+8, 2026-4-19 10:43 , Processed in 0.401124 second(s), 52 queries .

回顶部