Skip to content

Commit

Permalink
Update manifest's remediation suggestions to match with the docs'
Browse files Browse the repository at this point in the history
PR #1
  • Loading branch information
shreyamalviya authored and mssalvatore committed Aug 2, 2024
1 parent d4a7db4 commit 8f34888
Show file tree
Hide file tree
Showing 2 changed files with 12 additions and 8 deletions.
7 changes: 2 additions & 5 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,9 +7,6 @@ Changelog](https://keepachangelog.com/en/1.0.0/), and this project adheres to
the [PEP 440 version scheme](https://peps.python.org/pep-0440/#version-scheme).


## [Unreleased]
### Added
## [3.1.0] - 2024-08-02
### Changed
### Fixed
### Removed
### Security
- Remediation suggestions in the manifest file. #1
13 changes: 10 additions & 3 deletions manifest.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -6,17 +6,24 @@ supported_operating_systems:
target_operating_systems:
- linux
title: SNMP Exploiter
version: 3.0.0
version: 3.1.0
description: Attempts remote command execution over SNMP using known credentials.
safe: true
remediation_suggestion: >-
Configure SNMP to use read-only communities.
Use SNMPv3 with the authPriv security level, if possible.
Treat community strings as passwords.
Enable the read-only build option (NETSNMP_NO_WRITE_SUPPORT).
Configure SNMP to use read-only community strings.
Apply security updates to your Net-SNMP installation.
Limit access over SNMP to trusted hosts.
Use SNMPv3 with the authPriv security level if possible.
Note that even with only read access, an SNMP server can still expose crucial
information about the network.
The machine is vulnerable to an attack on Net-SNMP via
Expand Down

0 comments on commit 8f34888

Please sign in to comment.