The Web Local
 

 

 

snmp-fuzzer

 

SNMP fuzzer uses Protos test cases with an entirely new engine written in Perl. It provides efficient methods of determining which test case has caused a fault, offers more testing granularity and a friendlier user interface. 

Installation:

 

snmp-fuzzer is available from here.

 

tar -zxvf snmp-fuzzer-0.1.1.tar.gz
 

 

Execution:

 

snmpfuzz.pl [snmp] [--host=host] [ --port=port ] [--maxprocess=i]

 

Options:

    --port=n Target SNMP server port. Defaults to 161.

    --host Target SNMP server host.

    --maxprocess=n Maximum process fork to scan. Defaults to 20.

    --snmp request

    --snmpencode request

    --snmp trap

    --snmp trapencode

    --ping SNMP ping SysDescr request, community "public"

    --nodos Only one SNMP ping forked (recommended for fork scan)

    --fork Default no fork only ICMP listener and one UDP client

    --file=s Single PDU test

    --timeout=n Request timeout (1 second default)

    --retries=n UDP send retries . Default = 1

    --kill Kill if snmp ping is unsuccessful

    --help This message

 

Examples:

./snmpfuzz.pl --file snmp/00000001 --host 192.168.66.202

./snmpfuzz.pl --trap --ping --host 192.168.66.202 --port 162

./snmpfuzz.pl --snmp --nodos --ping --fork --maxprocess 10 --host 192.168.66.202

./snmpfuzz.pl --snmp --nodos --ping --fork --maxprocess 30 --kill --host 192.168.66.202 --timeout 3

 

 

IT Security News:

 

Pen Testing Framework:

 

Latest Tool Reviews: