Kali 2.0 – Exploit SNMP Devices
When a host is badly configured with default information, we can find out a wealth about the host. This information can be used with more advanced techniques and is the basis of any Security Audit.
by Metasploitation
simple network management protocol