If you have captured some network packets that is used to authenticate the SNMP exchange then you can brute for the password using the snmpv3brutearrow-up-right tool.
python3 snmpv3brute.py -w <wordlist> -p <snmp.pcap>
https://github.com/applied-risk/snmpv3brutearrow-up-right
https://datatracker.ietf.org/doc/html/rfc2571arrow-up-right
https://datatracker.ietf.org/doc/html/rfc3414arrow-up-right
https://www.ietf.org/rfc/rfc2574.txtarrow-up-right
https://www.mscs.dal.ca/~selinger/md5collision/arrow-up-right
Last updated 1 year ago