Metasploit has an in-built auxiliary module designed to sweep for Simple Network Management Protocol: snmp_enum.
Let’s see how it performs against my virtual hacking lab:
msf auxiliary(snmp_login) > set RHOSTS 192.168.1.79
RHOSTS => 192.168.1.79
msf auxiliary(snmp_login) > run
Output:
[*] :161SNMP – [001/118] – 192.168.1.79:161 – SNMP – Trying public… [+] SNMP: 192.168.1.79 community string: ‘public’ info: ‘Hardware: x86 Family 15 Model 2 Stepping 7 AT/AT COMPATIBLE – Software: Windows 2000 Version 5.1 (Build 2600 Uniprocessor Free)’
So, the Metasploit scanner does detect SNMP but didn’t uncover public and private strings, but I’m sure the information provided may be useful in some way.