QQ登录

只需要一步,快速开始

 注册地址  找回密码
查看: 2620|回复: 0
打印 上一主题 下一主题

对中国先锋网络科技基于SNMP的信息刺探

[复制链接]
字体大小: 正常 放大
韩冰        

823

主题

3

听众

4048

积分

我的地盘我做主

该用户从未签到

发帖功臣 元老勋章

跳转到指定楼层
1#
发表于 2004-10-5 08:56 |只看该作者 |正序浏览
|招呼Ta 关注Ta

作者: Net2k 来自:流星轨迹

0 p5 R( r; H, d( H

对中国先锋网络科技基于SNMP的信息刺探

& a' p6 g6 Q- J" m M* y( p ! W& |7 I g( z5 S4 S; ^/ _; V( N [( r$ {3 W) {7 t( u" L5 W: f5 U

得到系统正在运行的程序信息: T! Q* c( r! A8 _' p, Z7 {------------------------------------------------------------& U* H5 d2 }& ~6 T Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1 , P# n1 h8 S6 WValue = String System Idle Process

3 a- t: [" S6 d+ j1 r9 `/ o) f* n

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.8, S* p5 M3 n, P Value = String System

9 o3 f6 W- A6 p1 T2 _9 f' h' o

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.172 0 Z9 n0 [: w' @) d+ O/ PValue = String smss.exe

- z& P/ L1 I. b* m# q

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1969 |/ C/ F U0 E* N4 Q Value = String winlogon.exe

. M9 V* t4 P4 C: o/ e

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.200 8 Y% j. s2 b4 h; ]9 j2 f yValue = String csrss.exe

. J/ ]' ~3 ]* _ A. R

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.248 9 u* m& p: g* SValue = String services.exe

- `! C% J$ c, D" ^3 h" n

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.260 & Z1 _" I ?+ A- o* ^Value = String lsass.exe

( T/ ^' T3 R, M8 \: ~; {

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.296 ( T( U! Y4 L: I! w3 b* _, U2 @0 lValue = String wuauclt.exe

, Y! U8 I- i/ D

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.4567 U1 L+ I+ ]; l Value = String svchost.exe

, M/ g+ F0 N; p* e# E/ I

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.496 Q. y3 o0 B6 U7 C/ u. O) v$ H Value = String spoolsv.exe

3 V U& _5 `3 b, ^8 a; }% \0 A

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.524( f. J" x2 m: m( s$ f4 F Value = String msdtc.exe

K- u2 @' j0 Q/ k8 A( U" n& b L

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.656 1 ^7 W2 G" f4 H9 Z, D0 [! fValue = String DefWatch.exe

# G% i0 H7 I; U- ~) t7 k

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.676 # p% o8 p* V, k; A7 d" iValue = String tcpsvcs.exe

7 }4 i$ K7 s7 Y

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.692' _3 b; I+ ^4 [- P! t$ c4 a Value = String svchost.exe

- Q/ P0 e* c' e& w7 u+ H. B

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.720 ! q7 [6 w! l3 a7 Q0 SValue = String llssrv.exe

8 f8 m2 h1 e- H, c

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.764 # C; z# F. e' l/ c [$ TValue = String Rtvscan.exe

* s! C4 E9 e: G1 m7 `% U

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.872 $ P; F, h5 h4 bValue = String hlds.exe

. A) [: k, H# D

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.924 $ E; O$ B d3 T7 xValue = String nvsvc32.exe

# j A: a; j5 P8 i4 t) h- p

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.992 1 G$ v! G; z3 l. nValue = String Explorer.EXE

$ `! G* F2 E: U. a+ U+ W

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1000 3 L X) j: }/ zValue = String regsvc.exe

- l, Z. F' s0 V P. O. B0 m! H2 x

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1032 p; e+ ~% {' `! M! f0 N Value = String MSTask.exe

C8 ^1 N5 J: K! U: k/ Z7 J8 e

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1072 5 I$ p& S2 w2 @% ]3 I1 a, `Value = String snmp.exe

4 L4 z( |1 u# j6 [% I; O

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1092 + D8 |; {3 L( j% g2 v- A+ l0 i) PValue = String ServUDaemon.exe

. d9 P- ?& v- j$ M" ^8 x

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1104 2 x2 a" W+ J5 y# d% b' hValue = String SMAgent.exe

, k& L3 t+ [$ k8 _$ L- i( q* B4 J* O

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1140 * x9 w( J! n9 I- hValue = String WinMgmt.exe

) x, V( D5 h1 ~. C- M

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.11647 j' l. U& t; }0 G8 W' z6 ?4 [ Value = String wins.exe

! Q! v1 b+ r& M1 g" o

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1176, k0 w, g; _ B. ~' x( e2 L5 y Value = String svchost.exe

0 j3 L- O7 @$ l6 x

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1196 9 `/ K. y" @1 I7 e$ IValue = String xconfserver_t.e

) U0 @" X7 {; V9 w7 H

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.12283 L% X( X& H3 C Value = String Dfssvc.exe

: K6 s, C- n- [7 W: @. K% D

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1248* q" X% c2 k2 y4 f J Value = String inetinfo.exe

* o, C" ?; A- {

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1348. Q! V' [4 M" W6 P+ X Value = String dns.exe

1 ^4 F9 M3 a( N. }3 i$ n

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1568 ( A. u$ O$ o& P9 aValue = String vptray.exe

v; z9 J8 _4 A' L

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1580% r9 Y" L* P8 B& c: w Value = String internat.exe

8 J& o6 u% V. ]. `& j

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1844 . S8 e% z# M9 m- LValue = String dllhost.exe

5 K% Y' }: W) h B4 O9 E% D

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.19524 \: M) {# N, t/ ` Value = String dllhost.exe

5 \# }( S) T: c- Q. ?3 u

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.2060& W, ~2 \2 y/ c8 T4 U% h& A Value = String mdm.exe

4 l* \% g! j% D0 E

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.2144$ E: }; _2 c8 D* u }. D) Y& J; X% v Value = String conime.exe

; K1 L" o/ s) u ?" q, r

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.22168 i2 Q" h) N2 j4 x& F/ | Value = String hlds.exe

' J4 ]" H! k0 l2 i# S

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.23361 P; v/ {4 q6 T; v( D Value = String hlds.exe

7 f# j- _( S o

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.2348 3 y) \& X! }; @0 ^7 uValue = String svchost.exe

; M6 F. T3 O+ g4 g

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.2424! D9 ^5 I& f! l0 v Value = String hlds.exe

9 V# X3 N: _, Q4 `5 L

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.2460 4 _% Y& s& p' g9 i, S3 QValue = String hlds.exe

; e# h# S" N/ o6 C" n. V/ i! H

End of MIB subtree.& U1 _9 M1 t0 g w( I- Z ------------------------------------------------------------

* e8 J) i3 `- E% E5 A- b! v

得到系统信息:4 b! j& w3 t1 T! R0 Y4 | g ------------------------------------------------------------ , u# V) N- Y8 j$ s3 ^: x9 SVariable = system.sysDescr.06 h0 `' T( C' v# S Value = String Hardware: x86 Family 15 Model 2 Stepping 9 AT/AT COMPATIBLE -2 ?3 R; l, C! O# _0 p( ?* G Software: Windows 2000 Version 5.0 (Build 2195 Multiprocessor Free)

( N8 d. j- q5 S% \9 C: n" T) W

Variable = system.sysObjectID.09 f, S2 |0 `- A" {" P, I7 O% Y Value = ObjectID 1.3.6.1.4.1.311.1.1.3.1.2

$ b* a; ~4 [2 `; U* {) X% H! h9 F

Variable = system.sysUpTime.0 # x7 i: }, H0 `" `Value = TimeTicks 24725698

: p- M3 P6 F- ^' J

Variable = system.sysContact.0 ' E2 k$ n6 o9 {$ ]6 K DValue = String

- l: E3 p9 Z f& }

Variable = system.sysName.0$ `% a9 V4 {5 F Value = String XIAOTOU

4 }% P+ q1 [0 Q6 P

Variable = system.sysLocation.0 : a1 M7 w3 c) o& m% p- `Value = String

3 p/ o+ W {( \7 x

Variable = system.sysServices.0 " E5 B8 @- p& OValue = Integer32 76

1 p: s- A8 k- Y' {2 ?: E" f: G

End of MIB subtree. ; H# z: g2 {. a% C; p" U& _; }------------------------------------------------------------

- t9 B. s; @# v _, x/ X

------------------------------------------------------------ " h; a. J6 g$ `( @: D3 R关于snmputil的语法: 3 e, @3 O8 n$ s8 d# G4 a" \' T------------------------------------------------------------ ' l3 \1 b7 F. K" m- u+ L% aget,就理解成获取一个信息。

8 T9 x9 x; Z+ \" I

getnext,就理解成获取下一个信息。

; \5 N. ^$ ?; [4 x+ y

walk,就理解成获取一堆信息(嗯,应该说所有数据库子树/子目录的信息)

# J9 [* x5 \' [8 _

agent,具体某台机器拉。

: {; f9 |/ o7 {7 G/ M

community,嗯就是那个“community strings”“查询密码”拉。

, X+ u. Z1 b! l3 V: k) H6 g+ }

oid,这个要多说一下,这个呢,就是物件识别代码(Object Identifier)。 ! b8 p# X$ z7 U............................................................

9 k b! _; E" \& V/ e. T4 d6 V

例:6 ~ u3 _2 P$ _% v snmputil.exe walk 对方IP public .1.3.6.1.2.1.25.4.2.1.2 //**进程列表' `: ]) c3 {6 ]' J3 N9 I6 Z snmputil.exe walk 对方IP public .1.3.6.1.4.77.1.2.25.1.1 //**用户列表 1 y6 r/ @& b+ h2 B$ s9 D6 ]0 zsnmputil.exe get 对方IP public .1.3.6.1.4.77.1.4.1.0 //**域名 9 {1 X0 |; S7 n' n& p5 m( |: r. w) ssnmputil.exe walk 对方IP public .1.3.6.1.2.1.25.6.3.1.2 //**安装的软件 4 D O% k9 u; ?# o% ysnmputil.exe walk 对方IP public .1.3.6.1.2.1.1 //**系统信息

zan
转播转播0 分享淘帖0 分享分享0 收藏收藏0 支持支持0 反对反对0 微信微信
您需要登录后才可以回帖 登录 | 注册地址

qq
收缩
  • 电话咨询

  • 04714969085
fastpost

关于我们| 联系我们| 诚征英才| 对外合作| 产品服务| QQ

手机版|Archiver| |繁體中文 手机客户端  

蒙公网安备 15010502000194号

Powered by Discuz! X2.5   © 2001-2013 数学建模网-数学中国 ( 蒙ICP备14002410号-3 蒙BBS备-0002号 )     论坛法律顾问:王兆丰

GMT+8, 2026-4-18 21:11 , Processed in 0.428947 second(s), 52 queries .

回顶部