Submit a ticketCall us

Announcing NCM 7.7
With NCM 7.7, you can examine the rules that make up an access control list for a Cisco ASA device. Then you can apply filters to display only rules that meet the specified criteria, order the rules by line number or by the hit count, and much more.
See new features and improvements.

Home > Success Center > Engineer's ToolSet (ETS) > Engineer's Toolset Administrator Guide > List of tools included in Engineer's Toolset > SNMP Brute Force Attack > SNMP Brute Force Attack settings

SNMP Brute Force Attack settings

Table of contents
No headers
Created by Aileen de Lara_ret, last modified by Aileen de Lara_ret on Jan 13, 2017

Views: 2 Votes: 0 Revisions: 2

A number of settings can be adjusted to ensure SNMP Brute Force Attack operates properly on your network.

  1. Click File > Settings.
  2. To stop the attack when a Read/Only community string is found, select Stop searching after Read/Only string is found.
  3. To change the length of community strings attempted by SNMP Brute Force Attack, adjust the Try community strings up to xx characters long slider.
  4. Click the Character Set tab, and then select the character set you want SNMP Brute Force Attack to use to build the community strings, or enter a custom set of characters.
  5. Click the Community Strings tab.
  6. To use a starting community string, enter the string in the Starting Community String field.
  7. To establish the progression the attack engine builds the community strings, select Rotate from right to left or Rotate from left to right.
  8. Click the SNMP tab.
  9. Adjust the Packet Timeout slider to set the number of milliseconds the attack engine should wait for a SNMP reply before assuming the packet is lost.
  10. Adjust the Query Attempts slider to set the number of times the attack engine retries an SNMP query before giving up.
  11. Click OK.
 
Last modified
20:03, 12 Jan 2017

Tags

Classifications

Public