Obtaining a password for D-Link switches using the DGS-1500 as an example

    As you know, SNMP is an extremely useful protocol.

    However, if you do not configure D-Link switches (in our case, let you work with the public community), it can cause a vulnerability.

    Wandering around in search of OID for the value of processor load came across an interesting thread.

    Give it a try. This applies to the DGS-1500 and most likely some other D-Link models.

    snmpwalk -v2c -c public

    Also popular now: