In this paper, we show that adoption of the SNMPv3 network management protocol standard offers a unique - -but likely unintended - -opportunity for remotely fingerprinting network infrastructure in the wild. Specifically, by sending unsolicited and unauthenticated SNMPv3 requests, we obtain detailed information about the configuration and status of network devices including vendor, uptime, and the number of restarts. More importantly, the reply contains a persistent and strong identifier that allows for lightweight Internet-scale alias resolution and dual-stack association. By launching active Internet-wide SNMPv3 scan campaigns, we show that our technique can fingerprint more than 4.6 million devices of which around 350k are network routers. Not only is our technique lightweight and accurate, it is complementary to existing alias resolution, dual-stack inference, and device fingerprinting approaches. Our analysis not only provides fresh insights into the router deployment strategies of network operators worldwide, but also highlights potential vulnerabilities of SNMPv3 as currently deployed.
CITATION STYLE
Albakour, T., Gasser, O., Beverly, R., & Smaragdakis, G. (2021). Third time’s not a charm: Exploiting SNMPv3 for router fingerprinting. In Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC (pp. 150–164). Association for Computing Machinery. https://doi.org/10.1145/3487552.3487848
Mendeley helps you to discover research relevant for your work.