A method for automatically identifying from an ordinary station connected to a
TCP/IP network, the network components managed by a network management station
for which it is possible to read or write over the confidential network data they
store. Starting from the list of the default passwords protecting the network data
and the IP addresses of the network components communicating with the ordinary
station, the method allows by repeating the IP address discovery process, to discover
step by step the passwords used in all the network components managed by the network
management station and try to use them in reading or writing network information.
The method allows detecting the lack of protection by password which usually
occurs in campus networks and thus auditing such networks against intrusion from
one of the stations of the network.