Third Time's Not a Charm: Exploiting SNMPv3 for Router Fingerprinting

09/30/2021
by   Taha Albakour, et al.
0

In this paper, we show that adoption of the SNMPv3 network management protocol standard offers a unique – but likely unintended – opportunity for remotely fingerprinting network infrastructure in the wild. Specifically, by sending unsolicited and unauthenticated SNMPv3 requests, we obtain detailed information about the configuration and status of network devices including vendor, uptime, and the number of restarts. More importantly, the reply contains a persistent and strong identifier that allows for lightweight Internet-scale alias resolution and dual-stack association. By launching active Internet-wide SNMPv3 scan campaigns, we show that our technique can fingerprint more than 4.6 million devices of which around 350k are network routers. Not only is our technique lightweight and accurate, it is complementary to existing alias resolution, dual-stack inference, and device fingerprinting approaches. Our analysis not only provides fresh insights into the router deployment strategies of network operators worldwide, but also highlights potential vulnerabilities of SNMPv3 as currently deployed.

READ FULL TEXT
research
03/17/2019

NetKernel: Making Network Stack Part of the Virtualized Infrastructure

This paper presents a system called NetKernel that decouples the network...
research
02/22/2022

Quantum Internet Protocol Stack: a Comprehensive Survey

Classical Internet evolved exceptionally during the last five decades, f...
research
02/08/2021

Revocation Statuses on the Internet

The modern Internet is highly dependent on the trust communicated via X....
research
12/24/2019

Design and Comparison Migration between Ipv4 and Ipv6 Transition Techniques

IPv4 which is the old version of Internet Protocol has a new successor n...
research
04/20/2023

A Large-scale Examination of "Socioeconomic" Fairness in Mobile Networks

Internet access is a special resource of which needs has become universa...
research
12/01/2016

Comparison Between IPv4 to IPv6 Transition Techniques

The IPv4 addresses exhaustion demands a protocol transition from IPv4 to...
research
08/14/2022

IPvSeeYou: Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation

We present IPvSeeYou, a privacy attack that permits a remote and unprivi...

Please sign up or login with your details

Forgot password? Click here to reset