How to do it...

You will remember from our discussion of fingerprinting in Chapter 5, Fingerprinting, that after we identify our hosts and ports, we want to continue gathering more detailed information about the OS and services running. Sparta has some great preconfigured tools to help with this.  As an example, let's examine the contextual menus we now get when right-clicking on a service.  In the following example, we are examining an FTP service, and we are given the options to open a Telnet session, opening with Netcat, and grabbing the banner, among others:

Sparta will change the contextual menus depending on the service. In the following example, we're looking at an HTTP service. Given this, Sparta presents us with some new items related to web services, such as Run nikto and Launch dirbuster:

Let's configure a new host action that will allow us to analyze SNMP. This will be a host action and be displayed in that contextual menu. In order to achieve this, we follow these steps:  

  1. As before, we close Sparta and edit our Sparta configuration file using the vi /usr/share/sparta/sparta.conf command.  Under [HostActions], we add a new item, snmp=SNMPwalk, snmpwalk [IP] -c public -v 2c:
  1. Once we are done editing, save and exit the configuration file. 
  1. Now when we launch Sparta and reload our hosts, we can see a new host action when we right-click on a given host:
  1. If we run SNMPwalk, we can see the results opened up in a new tab, as shown in the following screenshot:
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset