Third time's not a charm

Exploiting SNMPv3 for router fingerprinting

Conference Paper (2021)
Author(s)

Taha Albakour (Technical University of Berlin)

Oliver Gasser (Max Planck Institut für Informatik)

Robert Beverly (Naval Post Graduate School of Engineering and Applied Sciences)

G. Smaragdakis (Technical University of Berlin, TU Delft - Cyber Security)

Research Group
Cyber Security
Copyright
© 2021 Taha Albakour, Oliver Gasser, Robert Beverly, G. Smaragdakis
DOI related publication
https://doi.org/10.1145/3487552.3487848
More Info
expand_more
Publication Year
2021
Language
English
Copyright
© 2021 Taha Albakour, Oliver Gasser, Robert Beverly, G. Smaragdakis
Research Group
Cyber Security
Pages (from-to)
150-164
ISBN (electronic)
9781450391290
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

In this paper, we show that adoption of the SNMPv3 network management protocol standard offers a unique - -but likely unintended - -opportunity for remotely fingerprinting network infrastructure in the wild. Specifically, by sending unsolicited and unauthenticated SNMPv3 requests, we obtain detailed information about the configuration and status of network devices including vendor, uptime, and the number of restarts. More importantly, the reply contains a persistent and strong identifier that allows for lightweight Internet-scale alias resolution and dual-stack association. By launching active Internet-wide SNMPv3 scan campaigns, we show that our technique can fingerprint more than 4.6 million devices of which around 350k are network routers. Not only is our technique lightweight and accurate, it is complementary to existing alias resolution, dual-stack inference, and device fingerprinting approaches. Our analysis not only provides fresh insights into the router deployment strategies of network operators worldwide, but also highlights potential vulnerabilities of SNMPv3 as currently deployed.