NETWORK ADMINISTRATIONSsnmp

Kali 2.0 – Exploit SNMP Devices

When a host is badly configured with default information, we can find out a wealth about the host. This information can be used with more advanced techniques and is the basis of any Security Audit.

source

by Metasploitation

simple network management protocol

Leave a Reply

Your email address will not be published. Required fields are marked *