QQ登录

只需要一步,快速开始

 注册地址  找回密码
查看: 2618|回复: 0
打印 上一主题 下一主题

对中国先锋网络科技基于SNMP的信息刺探

[复制链接]
字体大小: 正常 放大
韩冰        

823

主题

3

听众

4048

积分

我的地盘我做主

该用户从未签到

发帖功臣 元老勋章

跳转到指定楼层
1#
发表于 2004-10-5 08:56 |只看该作者 |倒序浏览
|招呼Ta 关注Ta

作者: Net2k 来自:流星轨迹

* Z- m6 E: m" S# f9 I5 |

对中国先锋网络科技基于SNMP的信息刺探

) d9 I# Y; Y, w2 ^ 0 P2 L" y# F+ Q2 @6 r& K$ X% v2 T2 e. k4 z8 w

得到系统正在运行的程序信息: ; u! @9 X0 ^ l O------------------------------------------------------------ + Y* Z2 }! P2 ?/ V+ V- ^& S2 OVariable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1 7 E* P8 z- L) c' w+ W6 k. D7 r( jValue = String System Idle Process

. W2 n2 F4 }5 c: h* p# h1 v/ c) X

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.8 * r2 ?1 {$ f6 i; V9 DValue = String System

* |0 u" k& ]- F4 i7 n. v3 w/ K* _

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.172 ! _ _, Z) }3 ~( Z- UValue = String smss.exe

' W3 p7 E; t* Z5 I+ |3 \; L" T8 h% G

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.196 # {2 s& [0 p2 f+ G1 SValue = String winlogon.exe

$ l, i5 i8 \& L1 r8 n: m' p! x! V! M

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.200 5 V; `& Y& Q; s& C6 j9 Q! [Value = String csrss.exe

1 o( E! L4 d" t, `& Q% {/ B

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.248 0 l5 V: n; g. `1 i+ dValue = String services.exe

0 _- A) N1 i8 u, n6 L

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.260" C3 L- O1 c4 e6 h* z; H/ N Value = String lsass.exe

& X y9 ~' {. Y S8 h M7 E1 I

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.2963 ^( e; ]/ f7 i5 N$ Y- c# ] Value = String wuauclt.exe

: Q$ X8 G; O) k" \) s( t

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.456 1 n. A7 i2 B2 v2 v+ e' T' RValue = String svchost.exe

5 z) T7 m) H6 I9 m) S% i) u6 P

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.496 3 t% H% J) e; jValue = String spoolsv.exe

- ?3 D" K6 i5 _

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.524 ( W/ U( j8 W! [7 ?; rValue = String msdtc.exe

$ m0 C; I, c0 n, V6 H+ d9 }

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.6568 x7 Y( J7 ~# A( X& j Value = String DefWatch.exe

W: l/ a' W3 v! x% J/ ~# j Q

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.676 8 g, K! q: E8 cValue = String tcpsvcs.exe

8 F* C2 v2 A0 m! D! G$ D0 O

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.692) V7 g& c, v8 e0 l" l3 { Value = String svchost.exe

! A% y8 s( J# p2 G

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.720 ! B- f H# S: QValue = String llssrv.exe

' p: E' L* k( F; Z8 W! M9 g U+ C

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.764 / K% M& b, s5 l6 J" i! X; {Value = String Rtvscan.exe

6 j2 l+ v5 Z' i: H

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.872+ _4 q* H& m5 E' N' f2 I( @ Value = String hlds.exe

" [' R i( X# C6 f

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.924# Q+ l3 G/ Q, e8 l2 s4 W; e Value = String nvsvc32.exe

9 o% K* `' E& S3 @. @6 ]- F

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.9921 ~3 G2 M! h7 I* u Value = String Explorer.EXE

0 V t: j4 V9 @# P Z) s% z

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1000 7 q: U! P; |2 w% jValue = String regsvc.exe

J0 Z2 o4 [7 s# B: n

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1032 ' L7 ?7 N# z) p7 A3 zValue = String MSTask.exe

9 _0 {$ L i; t0 \8 @$ B

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1072 / w( h/ B& z% v e; SValue = String snmp.exe

- L2 z9 {' G. i' |" z* b

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.10927 `+ l* h, Q3 q; P0 b6 H# b' P Value = String ServUDaemon.exe

. T# ^ W6 f$ J) U

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1104! ~/ z- \3 a# ~1 D: h Value = String SMAgent.exe

4 ~+ ]! p, H- u: D# N1 M, g

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.11409 h8 F/ G* o$ N5 p Value = String WinMgmt.exe

J- a. r! s* D# Q& r

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1164 1 _4 ]8 [7 O; d2 W! Y0 y! NValue = String wins.exe

+ S5 [( b4 @$ n

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1176, ?+ _" a$ i# L Value = String svchost.exe

1 P9 {4 Y. w1 B9 I3 A

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1196; I) ~1 Y# S2 l- [. x Value = String xconfserver_t.e

* ]9 q6 Y( f$ a6 w# U0 e+ y! C) X

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.12286 D, K( X& i9 _ Value = String Dfssvc.exe

$ z. \3 X9 d j1 V# H" x

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.12485 V( Z4 z6 V5 N% [ Value = String inetinfo.exe

3 o+ Y, y' ?3 j# C; Y+ X \, i

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1348) ]6 R. H+ C) O- v/ t8 z Value = String dns.exe

2 T/ Y$ F9 R/ X3 j' J( j

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1568 * \- K6 D4 @4 MValue = String vptray.exe

, {; J& K' r; l. {# B# n

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1580 7 o: B9 J7 ^( G: T# y) zValue = String internat.exe

- w1 J2 G. ^1 q' R6 [7 G

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1844- U' u% s/ { T3 c Z Q! l Value = String dllhost.exe

; C# }# Y! J) l2 `/ e% g8 G

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.1952 7 G, m' A4 T; D' \5 KValue = String dllhost.exe

8 C h1 o+ j! U9 I& c

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.2060: C% ~8 T* K+ z# r) g. ^- l; { Value = String mdm.exe

; X7 _- D7 N J6 Z

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.2144 Q6 G* [# V, H" _6 M Value = String conime.exe

' f/ j# g- U9 K1 b/ H, x

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.2216: E' i* u1 M% d/ M( f Value = String hlds.exe

o3 I w+ {# Q5 O$ I1 M6 t

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.2336 . G+ X \# C: e+ K+ E/ f; WValue = String hlds.exe

6 C" q; P9 l% o0 G

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.2348 : Y6 W8 d. q! i0 R. iValue = String svchost.exe

. b% `# X* }2 _: B

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.2424 1 P- G0 a f+ RValue = String hlds.exe

% G5 a, a% t3 s

Variable = host.hrSWRun.hrSWRunTable.hrSWRunEntry.hrSWRunName.2460! ]: [6 d8 ]4 ?/ A- ` Value = String hlds.exe

& u0 D# P; z- o

End of MIB subtree.4 V4 ^# z0 T% ?' P) C! z P9 C+ \2 P& r ------------------------------------------------------------

0 f1 X: X) y3 k$ ?5 ^5 Q3 P

得到系统信息: , f6 C! z) F2 J3 w3 p------------------------------------------------------------ . k: s$ I" f/ h( pVariable = system.sysDescr.0 % T9 J% E. {7 y8 n |Value = String Hardware: x86 Family 15 Model 2 Stepping 9 AT/AT COMPATIBLE -' a& c) {7 e- r Software: Windows 2000 Version 5.0 (Build 2195 Multiprocessor Free)

3 `3 K. D8 {0 J

Variable = system.sysObjectID.0 0 a1 ~; U" @# E% z1 JValue = ObjectID 1.3.6.1.4.1.311.1.1.3.1.2

8 s$ A/ ]/ c' L* T0 P9 h

Variable = system.sysUpTime.05 L. d/ a) p1 y1 i, A Value = TimeTicks 24725698

$ m% J P* A0 R1 c7 p/ s/ a

Variable = system.sysContact.0 9 P( g) X8 C' lValue = String

- p4 r- l4 g( @& ^

Variable = system.sysName.0- n2 s2 O: S, T2 P Value = String XIAOTOU

1 Y+ U% }% ]1 v0 d% D$ I

Variable = system.sysLocation.02 {$ P, V) n3 [, c) w! q: f5 B: G Value = String

/ L! T! }6 s: U3 R/ S# |1 X" e

Variable = system.sysServices.0" c- v4 [ T6 e; J. ]6 F$ @ Value = Integer32 76

, E5 q4 T6 M. `" x4 B+ J& v$ n" C

End of MIB subtree. 5 F4 o& M: S! M! H p- C# N; w------------------------------------------------------------

r3 H @( c5 p9 [: v

------------------------------------------------------------. F# Q. S! Q2 C$ V' f7 k) m$ S 关于snmputil的语法:* D1 a7 A' ?$ Q2 Y ------------------------------------------------------------3 ]5 C) E3 c6 d- g get,就理解成获取一个信息。

, H* }9 d1 G: O" J/ g0 [

getnext,就理解成获取下一个信息。

; r7 `5 Z3 }& v- ~$ [1 R

walk,就理解成获取一堆信息(嗯,应该说所有数据库子树/子目录的信息)

0 G3 I. |& }5 y+ p4 P

agent,具体某台机器拉。

8 C2 }) y- E1 p: d, P) P

community,嗯就是那个“community strings”“查询密码”拉。

! I! V8 a1 }& s) G# v+ C% h$ X* a

oid,这个要多说一下,这个呢,就是物件识别代码(Object Identifier)。. M1 N( D/ _! K) ~/ }& y" ` ............................................................

$ j7 U9 i. f0 n C2 j: E

例: - E# u H8 Y/ f2 ]& x5 Q, Fsnmputil.exe walk 对方IP public .1.3.6.1.2.1.25.4.2.1.2 //**进程列表 $ x% q5 Q4 Q% j5 Vsnmputil.exe walk 对方IP public .1.3.6.1.4.77.1.2.25.1.1 //**用户列表 6 d J$ |. q8 R6 e/ h( q5 h; gsnmputil.exe get 对方IP public .1.3.6.1.4.77.1.4.1.0 //**域名* U& i" x3 h, w; R snmputil.exe walk 对方IP public .1.3.6.1.2.1.25.6.3.1.2 //**安装的软件7 O8 L2 \* o; h F snmputil.exe walk 对方IP public .1.3.6.1.2.1.1 //**系统信息

zan
转播转播0 分享淘帖0 分享分享0 收藏收藏0 支持支持0 反对反对0 微信微信
您需要登录后才可以回帖 登录 | 注册地址

qq
收缩
  • 电话咨询

  • 04714969085
fastpost

关于我们| 联系我们| 诚征英才| 对外合作| 产品服务| QQ

手机版|Archiver| |繁體中文 手机客户端  

蒙公网安备 15010502000194号

Powered by Discuz! X2.5   © 2001-2013 数学建模网-数学中国 ( 蒙ICP备14002410号-3 蒙BBS备-0002号 )     论坛法律顾问:王兆丰

GMT+8, 2026-4-18 17:45 , Processed in 0.282623 second(s), 52 queries .

回顶部