Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <5a46fd1d-6dee-40a4-801d-9a27c8555742@gmail.com>
Date: Tue, 3 Jun 2025 10:02:18 +0200
From: Albert Veli <albert.veli@...il.com>
To: john-users@...ts.openwall.com
Subject: SNMPv3 format

Hi list!

There is a format for SNMPv3 in the john source here:
https://github.com/openwall/john/blob/bleeding-jumbo/src/snmp_fmt_plug.c

But I can't find a script in the run directory to extract the hash from 
a pcap of a captured SNMPv3 walk.

EXAMPLE

I created a read-only SNMPv3 user "albert" on a device with the easy to 
crack password iloveyou and authentication method MD5. Then I tcpdumped 
a walk when running this command:

snmpwalk -v3 -l authNoPriv -u albert -a MD5 -A iloveyou 198.18.1.1 
1.3.6.1.2.1.1.1.0

So my question is, how can I extract something that john can crack from 
the captured pcap?

Best regards,

Albert

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.