QQ登录

只需要一步,快速开始

 注册地址  找回密码
查看: 2621|回复: 0
打印 上一主题 下一主题

对中国先锋网络科技基于SNMP的信息刺探

[复制链接]
字体大小: 正常 放大
韩冰        

823

主题

3

听众

4048

积分

我的地盘我做主

该用户从未签到

发帖功臣 元老勋章

跳转到指定楼层
1#
发表于 2004-10-5 08:56 |只看该作者 |倒序浏览
|招呼Ta 关注Ta

作者: Net2k 来自:流星轨迹

* _: Q/ i3 x+ X5 J/ _. u

对中国先锋网络科技基于SNMP的信息刺探

0 U' i! g* | q3 j % ]0 v( x2 X+ t& c& D 1 b% H p* F1 R7 r' y+ N0 b

得到系统正在运行的程序信息: 5 n/ [, q. O R3 H, k m------------------------------------------------------------ * l2 m2 T3 [4 [4 @- p- C" W% {Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1" d2 f# I8 L7 E- e Value = String System Idle Process

& q- W/ n3 ^2 c: I$ l" H' E

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.8. b$ L+ r$ {; h3 q2 s Value = String System

0 }7 I8 D* B5 g1 K; v

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1722 L3 E) D2 Z: v& P+ s Value = String smss.exe

# ^' s# n$ U2 b4 f

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.196 , ^- c @7 i# N- n( pValue = String winlogon.exe

* S5 K6 d8 D; j# B% [( a7 c

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.2004 S6 `3 k8 ?% ]7 c0 y% V Value = String csrss.exe

5 m# P/ R2 T; y+ s: M

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.2482 i r+ Y. P, w; o6 q9 B6 t Value = String services.exe

+ |: h r" {- z: [7 c

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.260 , k6 j" h* y+ MValue = String lsass.exe

* J! B! v; l* I A4 P; r5 L1 w1 ~5 X/ i

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.296 / M* }+ r4 ~; A" B% C: KValue = String wuauclt.exe

- q) ?( i9 u3 P) q

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.4561 M/ R7 L9 i) o( E# ]7 M Value = String svchost.exe

$ |$ M, B! B' t; V

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.496 9 ?3 E* B1 X5 b2 w' [. A2 LValue = String spoolsv.exe

; ]" h0 J n2 B8 K6 u" Z

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.524 : Z7 w, K3 I$ vValue = String msdtc.exe

4 ^+ ?/ z+ L# \2 W2 t& B

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.656 ; p9 l9 G; c1 n% Q s3 rValue = String DefWatch.exe

0 G; M5 S0 u) S+ K5 n

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.676 8 ^- k+ e. G U8 G5 e7 x" ?: J8 A3 n1 HValue = String tcpsvcs.exe

) e W# G" V6 V- V/ e

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.692% D2 I, {( [* h" X H: o4 p/ R Value = String svchost.exe

( F( B$ K2 P' x4 _( L& f* l

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.720" Q6 J! j X( V5 x, E& ` Value = String llssrv.exe

c6 o# P! ?6 ]# n9 s+ N

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.764 ; I2 U/ ^6 c' k3 {/ b- hValue = String Rtvscan.exe

1 s7 c n) V/ z$ x+ B/ V( i

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.8721 W a+ w i0 n) `7 j1 G" m" b, R: M Value = String hlds.exe

8 v2 S, P3 Y7 Q; m- g2 Z: v

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.924+ L1 Q7 n3 @9 U! `7 D2 U Value = String nvsvc32.exe

5 V* Y7 c' w `1 ]7 p. Y

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.992 3 B& J; K8 F" Z! D2 c N+ pValue = String Explorer.EXE

4 v6 l; p$ Y2 y0 V

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1000 ) @5 q. d: Q. H" Q6 ?' d aValue = String regsvc.exe

$ U: r" X6 J6 a" O* W; J) p% t4 u9 |

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1032 2 O, i4 J. j. t) k4 y$ @Value = String MSTask.exe

) I" f0 W+ y3 {/ ^0 v

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1072 - j2 m; m5 V/ m! FValue = String snmp.exe

% I% v" Q0 a+ i

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1092 - M) m! _' N/ x$ j5 b/ i0 z) JValue = String ServUDaemon.exe

+ S& O. N: L4 {' x

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.11043 h8 L* }, P, ^# G5 m0 w8 `4 M7 h! ] Value = String SMAgent.exe

2 ]% Q$ W# H3 B' _: V0 e' q

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.11409 \: B1 t% W9 ?2 x: w6 P _- v$ O Value = String WinMgmt.exe

. z. J" R q) _4 k; {/ T

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1164/ d) K# W8 ?# K* Z+ D Value = String wins.exe

3 N% N& r! ?+ G- x6 V

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1176& D9 ]: [" d0 U, O6 n; S Value = String svchost.exe

& L: Y( f9 d1 L/ M1 g

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.11964 p8 ]* h: k! ^" F7 F) A" T Value = String xconfserver_t.e

( _" H" L0 |. p r$ P

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1228 . {2 X' `; e4 u7 r: DValue = String Dfssvc.exe

2 I, B% U: X d+ k, Y4 C

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1248+ Y4 d9 T( [: t) W; H T& h Value = String inetinfo.exe

9 a8 J- b: ]8 L) K3 q" z

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1348% J; h: W4 [; T9 d Value = String dns.exe

a# F6 \8 G# ~5 w+ U. i

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1568 3 v' ?# f& |8 o5 Y* lValue = String vptray.exe

l2 e$ a7 [/ C& B; D

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1580 ( W; L% Q2 d2 `$ ^Value = String internat.exe

% E. k* v0 H) G4 w$ ^9 y2 G& a3 h4 J

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1844 6 _& e) r) V0 Z/ C$ W i; AValue = String dllhost.exe

) c. J( e1 X8 O9 H. w+ p

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.19526 T& E n) z! ~ N1 n8 t1 X/ E; n Value = String dllhost.exe

4 ]. |/ V" P) A9 Y

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.2060 ( H3 v+ N9 e3 g" [. oValue = String mdm.exe

* U5 H/ Y1 w" R8 P) ^

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.21442 }6 w7 E8 [$ ^" T$ s Value = String conime.exe

1 C" \6 l( u: z. V# O z& S9 f

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.2216 5 u! C$ l6 o' n5 m& a$ MValue = String hlds.exe

, J3 ?4 N' ~ u5 |' E" w9 U

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.2336 9 B, ^. ^* E0 g: h7 `' ~1 \6 I. HValue = String hlds.exe

# R m5 y7 N, p8 W+ W1 w" H. c

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.2348 / X \5 ^( ]5 j- d8 D( }) w5 y; NValue = String svchost.exe

( ^- X+ j, E+ }# ^

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.2424 , O" w8 J+ F! [1 {3 wValue = String hlds.exe

+ A1 @2 W9 _9 o3 x6 w, l

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.2460 % f2 D9 ?& |1 _0 JValue = String hlds.exe

: e' ]( n4 C; K3 Q1 a

End of MIB subtree.# E, C* i6 F. O% w* Q; i ------------------------------------------------------------

$ U( t2 s8 k b* b8 M

得到系统信息: 9 {% w7 U+ J+ L1 w( z------------------------------------------------------------+ ]! h* L6 a) I: a) c, i8 \ Variable = system.sysDescr.0( h5 }$ t0 U, j( f5 H/ y3 m Value = String Hardware: x86 Family 15 Model 2 Stepping 9 AT/AT COMPATIBLE - % D( f" r, o9 c, s7 RSoftware: Windows 2000 Version 5.0 (Build 2195 Multiprocessor Free)

e# M) b& Q5 O. @

Variable = system.sysObjectID.0 & e& j3 M, p0 j, ]* \& S3 S+ VValue = ObjectID 1.3.6.1.4.1.311.1.1.3.1.2

+ I' {4 H4 X3 @0 p% R/ s

Variable = system.sysUpTime.0 8 N. _# L, |1 d* E0 ~Value = TimeTicks 24725698

1 U( J3 y3 [! X4 Y* _

Variable = system.sysContact.0* S: N% P$ u: Y6 r: q Value = String

6 v+ {3 N" t; Y* w$ [

Variable = system.sysName.0- {' A# ^" h0 F) c Value = String XIAOTOU

9 X6 Q% u+ Z }$ N; y

Variable = system.sysLocation.0" J6 x+ C6 t% Y. I Value = String

. M! o3 ^! q$ x! E* u( m

Variable = system.sysServices.0 * y9 k' g. {* B' sValue = Integer32 76

; k# S; L$ i9 _: Q8 U* j

End of MIB subtree. ! A: B$ ]4 S$ b# q------------------------------------------------------------

6 K! t5 B2 q& ]

------------------------------------------------------------ " H# K$ @2 s5 q* e4 G+ S关于snmputil的语法: ! U0 x( U% J+ g! t/ m, E1 @------------------------------------------------------------9 j2 M+ s/ G5 t! }) M1 Z! S) T get,就理解成获取一个信息。

3 P( ~* f& h+ S2 g% g5 f0 l

getnext,就理解成获取下一个信息。

" u3 f' B0 Z# b/ o# h

walk,就理解成获取一堆信息(嗯,应该说所有数据库子树/子目录的信息)

b! y3 g$ k- @3 z; N' g; a

agent,具体某台机器拉。

% V2 {0 Z! ]. X) p# t

community,嗯就是那个“community strings”“查询密码”拉。

- x8 b* ?& `; q [

oid,这个要多说一下,这个呢,就是物件识别代码(Object Identifier)。+ q, C8 ~. u) m n D ............................................................

X4 V2 q# R# R: a

例:9 }! r# K I) N6 z9 l h$ j4 H! c* q snmputil.exe walk 对方IP public .1.3.6.1.2.1.25.4.2.1.2 //**进程列表 9 Y) e) p% K( u6 o- K- m Asnmputil.exe walk 对方IP public .1.3.6.1.4.77.1.2.25.1.1 //**用户列表 $ j6 t9 M$ j8 q) [ D2 \; jsnmputil.exe get 对方IP public .1.3.6.1.4.77.1.4.1.0 //**域名 , p% h' I" K2 ~% n& Osnmputil.exe walk 对方IP public .1.3.6.1.2.1.25.6.3.1.2 //**安装的软件1 ^. A2 ^8 a+ j' i, _ snmputil.exe walk 对方IP public .1.3.6.1.2.1.1 //**系统信息

zan
转播转播0 分享淘帖0 分享分享0 收藏收藏0 支持支持0 反对反对0 微信微信
您需要登录后才可以回帖 登录 | 注册地址

qq
收缩
  • 电话咨询

  • 04714969085
fastpost

关于我们| 联系我们| 诚征英才| 对外合作| 产品服务| QQ

手机版|Archiver| |繁體中文 手机客户端  

蒙公网安备 15010502000194号

Powered by Discuz! X2.5   © 2001-2013 数学建模网-数学中国 ( 蒙ICP备14002410号-3 蒙BBS备-0002号 )     论坛法律顾问:王兆丰

GMT+8, 2026-4-19 00:24 , Processed in 0.417862 second(s), 52 queries .

回顶部