Network Services
FTP
Anonymous login
ftp anonymous@<target> # No password needed
Auto login
sshpass -p '<password>' ftp <user>@<target>
Browser URL
ftp://<user>:<password>@<target>
SSL
lftp <target> -e "set ssl:verify-certificate no; set ftp:ssl-force true"
Download all files
wget -r --user='<user>' --password='<password>' ftp://<target>
SSH
Default credentials
Check for default credentials depending on the vendor:
Vendor
Usernames
Passwords
APC
apc, device
apc
Brocade
admin
admin123, password, brocade, fibranne
Cisco
admin, cisco, enable, hsa, pix, pnadmin, ripeop, root, shelladmin
admin, Admin123, default, password, secur4u, cisco, Cisco, _Cisco, cisco123, C1sco!23, Cisco123, Cisco1234, TANDBERG, change_it, 12345, ipics, pnadmin, diamond, hsadb, c, cc, attack, blender, changeme
Citrix
root, nsroot, nsmaint, vdiadmin, kvm, cli, admin
C1trix321, nsroot, nsmaint, kaviza, kaviza123, freebsd, public, rootadmin, wanscaler
D-Link
admin, user
private, admin, user
Dell
root, user1, admin, vkernel, cli
calvin, 123456, password, vkernel, Stor@ge!, admin
EMC
admin, root, sysadmin
EMCPMAdm7n, Password#1, Password123#, sysadmin, changeme, emc
HP/3Com
admin, root, vcx, app, spvar, manage, hpsupport, opc_op
admin, password, hpinvent, iMC123, pvadmin, passw0rd, besgroup, vcx, nice, access, config, 3V@rpar, 3V#rpar, procurve, badg3r5, OpC_op, !manage, !admin
Huawei
admin, root
123456, admin, root, Admin123, Admin@storage, Huawei12#$, HwDec@01, hwosta2.0, HuaWei123, fsp200@HW, huawei123
IBM
USERID, admin, manager, mqm, db2inst1, db2fenc1, dausr1, db2admin, iadmin, system, device, ufmcli, customer
PASSW0RD, passw0rd, admin, password, Passw8rd, iadmin, apc, 123456, cust0mer
Juniper
netscreen
netscreen
NetApp
admin
netapp123
Oracle
root, oracle, oravis, applvis, ilom-admin, ilom-operator, nm2user
changeme, ilom-admin, ilom-operator, welcome1, oracle
VMware
vi-admin, root, hqadmin, vmware, admin
vmware, vmw@re, hqadmin, default
https://book.hacktricks.xyz/network-services-pentesting/pentesting-ssh#default-credentials
Auto login
sshpass -p '<password>' ssh <user>@<target>
Private key login
ssh -i id_rsa <user>@<target>
Generate RSA keys
ssh-keygen -t rsa -f id_rsa
User enumeration - OpenSSH <7.7
Any version of OpenSSH up to 7.7 is vulnerable to user enumeration (CVE-2018-15473) if not patched. To exploit this vulnerability, we can use the following script:
HTTP/HTTPS
Web Technologies
whatweb http://<target>
File and Directory Enumeration
nmap -p80,443 --script http-enum <target>
gobuster dir -u http://<target>/ -w wordlist.txt
wfuzz -w wordlist.txt http://<target>/FUZZ
# Good option for BurpSuite requests
ffuf -request request.txt -w wordlist.txt http://<target>/
Subdomain Enumeration
gobuster vhost -u http://<target>/ -w wordlist.txt
wfuzz -H 'Host: FUZZ.<target>' -w wordlist.txt http://<target>/
User input
Web VulnerabilitiesSMB
System enumeration with enum4linux
enum4linux -a [-u '<user>' -p '<password>'] <target>
Shares Enumeration
# null session
smbclient -N -L //<target>
# authenticated
smbclient -U '<user>[%<password>]' -L //<target>
# conect to a share
smbclient [-U '<user>[%<password>]'] //<target>/share
RPC
Automated Enumeration
rpcdump.py <target>
Manual Enumeration
# null session
rpcclient -U '' -N <target>
# authenticated
rpcclient -U '<user>%<password>' -N <target>
# commands
rpcclient -U '[<user>%<password>]' -N <target> -c 'command'
Last updated