NEVER scan a computer you
do not own or have the owner's permission
- Last Review: July 29, 2013
Home > NetScanTools
Pro > Technical Details > SNMP
SNMP Tools (Core and Advanced) Description
About the SNMP - Core and Advanced Tools
SNMP (Simple Network Management Protocol)
is one of the most powerful and important tools
in NetScanTools Pro. This tool communicates with
SNMP enabled devices using SNMP version 1, 2c and
version 3. You can gather a wealth of detailed information
about the target system provided the target is running
SNMP and you have the right access credentials (community
name or SNMPv3 access). Devices that run SNMP include
network switches, routers and even Windows computers.
Here are a few of the things you
- Listening process/daemon
programs running on the target.
- Network Interface details
such as the IPv4/IPv6 address(es) and MAC address,
speed, MTU and status of each interface.
- TCP, UDP, ICMP, IP protocol
real time statistics.
- Detailed information about
the type of system, model number, including
operating system type, revision, system uptime,
serial number, and sometimes information like
the names of the contact person and the computer
- All kinds of statistics about
things like packets, device status, etc.
- The LAN manager shared resources.
- The usernames of the Windows
accounts (if LAN manager MIB is running on a
Explore NetScanTools >>
See tool videos >>
a free demo >>
Version 11 SNMP Core and Advanced Tool Slideshow
Purpose of the SNMP Tools
- The purpose of this tool is to
create SNMP queries to send to a target then display
the response from the target. If the target is running
SNMP and you have the proper access credentials, you
can gain an enormous amount of information about the
This tool is currently IPv4 only. IPv6
migration will be occurring at some point during the v11
SNMP Tool Capabilities
The SNMP toolset is split into two
tools, Core and Advanced:
- [Select OID...] button (core).
This is used to bring up a selection tree for choosing
the OID (object identifier) number to use during your
queries. OIDs are like database indexes to a particular
object of data which may be static or dynamically updated
in real time. This selection tree is built using the
currently loaded OIDs.
- Walk (core).
OID numbers are organized in a directory tree structure,
the walk command will allow you to view all the subitem
entries and their data values for a particular parent
- WalkBulk (core, v2c/v3 only).
This differs from the Walk function above in that a
group of subitem data values can be retrieved with each
request. The final result is the same, it is more efficient.
You can define how many items you will accept using
'max bulk reps'.
- Get (core).
This feature "gets" the single data value or string
associated with a specific OID.
- GetNext (core).
This feature "gets" the next data value or string after
a specific OID.
- GetBulk (core, v2c/v3 only).
This feature "gets" the data value or string associated
with a specific set of OIDs beginning with the one you
entered. Similar to WalkBulk except that only the item
count you enter in 'max bulk reps' is used.
- Set (core).
This feature "sets" the data associated with a specific
OID to a new value. The Set dialog appears with a means
to select the type of data entered and the value.
- OID Conversion
(core). There are two of these
features. One is for converting from a numeric OID to
a more human friendly text representation and the other
reverses the procedure. This depends on the text of
the MIB to be present. You can easily add your own MIBs
into this program.
- Get Status (core).
This query requests for a number of OID entries to provide
you with a quick look into the status of the target
system such as interface count and status.
- Routing Table Report (advanced).
Shows the IPv4 routing table from the target.
- Arp Cache Report (advanced).
View the current arp cache on the target.
- Listening Ports Report (advanced).
Show the listening ports on the target.
- System Info Report (advanced).
Shows system description, time since boot, system name,
location, contact and more.
- SNMP Dictionary Attack Tool (advanced)
- uses password guessing to recovery the community name
(password) from an SNMP v1/v2c device. Can scan a set
of devices simultaneously.
- SNMP Scanner Tool (advanced)
- similar to the Dictionary Attack tool except instead
of guessing the community name, you give it a list of
expected community names. You also give it a list of
A video of the SNMP Tool
Here are links to related tools.