Submit a ticketCall us

Quickly Address Software Vulnerabilities
Patch Manager is an intuitive patch management software which extends the capabilities of WSUS and SCCM to not only patch Windows® servers and workstations, and Microsoft® applications, but also other 3rd-party applications which are commonly exploited by hackers. Learn more about our patch management solution.

 

Home > Success Center > Engineer's ToolSet (ETS) > Engineer's Toolset Administrator Guide > Tools Reference > SNMP Brute Force Attack > SNMP Brute Force Attack settings

SNMP Brute Force Attack settings

Table of contents
No headers
Created by Aileen de Lara, last modified by Aileen de Lara on Jan 13, 2017

Views: 2 Votes: 0 Revisions: 2

A number of settings can be adjusted to ensure SNMP Brute Force Attack operates properly on your network.

  1. Click File > Settings.
  2. To stop the attack when a Read/Only community string is found, select Stop searching after Read/Only string is found.
  3. To change the length of community strings attempted by SNMP Brute Force Attack, adjust the Try community strings up to xx characters long slider.
  4. Click the Character Set tab, and then select the character set you want SNMP Brute Force Attack to use to build the community strings, or enter a custom set of characters.
  5. Click the Community Strings tab.
  6. To use a starting community string, enter the string in the Starting Community String field.
  7. To establish the progression the attack engine builds the community strings, select Rotate from right to left or Rotate from left to right.
  8. Click the SNMP tab.
  9. Adjust the Packet Timeout slider to set the number of milliseconds the attack engine should wait for a SNMP reply before assuming the packet is lost.
  10. Adjust the Query Attempts slider to set the number of times the attack engine retries an SNMP query before giving up.
  11. Click OK.
 
Last modified
20:03, 12 Jan 2017

Tags

Classifications

Public