Obtaining a password for D-Link switches using the DGS-1500 as an example

    As you know, SNMP is an extremely useful protocol.

    However, if you do not configure D-Link switches (in our case, let you work with the public community), it can cause a vulnerability.

    Wandering around in search of OID for the value of processor load came across an interesting thread.

    Give it a try. This applies to the DGS-1500 and most likely some other D-Link models.

    snmpwalk -v2c -c public 192.168.0.1 1.3.6.1.4.1.171.10.126.4.1.1.7.0

    Also popular now: