Skip to content

Commit

Permalink
Adding basic docs for creds modules (threat9#443)
Browse files Browse the repository at this point in the history
  • Loading branch information
lucyoa authored May 29, 2018
1 parent d64359b commit ed19c56
Show file tree
Hide file tree
Showing 153 changed files with 5,702 additions and 12 deletions.
2 changes: 1 addition & 1 deletion .github/PULL_REQUEST_TEMPLATE.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,4 +12,4 @@ Provide steps to test or reproduce the PR.
- [ ] `run`
- [ ] ...
- [ ] Write tests ([Example](https://github.com/threat9/routersploit/blob/master/tests/exploits/routers/dlink/test_dsl_2750b_rce.py))
- [ ] Document how it works
- [ ] Document how it works ([Example](https://github.com/threat9/routersploit/blob/master/docs/modules/exploits/routers/dlink/dsl_2750b_rce.md))
38 changes: 38 additions & 0 deletions docs/modules/creds/cameras/acti/ftp_default_creds.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
## Description

Module performs dictionary attack with default credentials against Acti Camera FTP service.
If valid credentials are found, they are displayed to the user.

## Verification Steps

1. Start `./rsf.py`
2. Do: `use creds/cameras/acti/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.

## Scenarios

```
rsf > use creds/cameras/acti/ftp_default_creds
rsf (Acti Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Acti Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
38 changes: 38 additions & 0 deletions docs/modules/creds/cameras/acti/ssh_default_creds.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
## Description

Module performs dictionary attack with default credentials against Acti Camera SSH service.
If valid credentials are found, they are displayed to the user.

## Verification Steps

1. Start `./rsf.py`
2. Do: `use creds/cameras/acti/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.

## Scenarios

```
rsf > use creds/cameras/acti/ssh_default_creds
rsf (Acti Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Acti Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
38 changes: 38 additions & 0 deletions docs/modules/creds/cameras/acti/telnet_default_creds.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
## Description

Module performs dictionary attack with default credentials against Acti Camera Telnet service.
If valid credentials are found, they are displayed to the user.

## Verification Steps

1. Start `./rsf.py`
2. Do: `use creds/cameras/acti/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.

## Scenarios

```
rsf > use creds/cameras/acti/telnet_default_creds
rsf (Acti Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Acti Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
38 changes: 38 additions & 0 deletions docs/modules/creds/cameras/american_dynamics/ftp_default_creds.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
## Description

Module performs dictionary attack with default credentials against American Dynamics Camera FTP service.
If valid credentials are found, they are displayed to the user.

## Verification Steps

1. Start `./rsf.py`
2. Do: `use creds/cameras/american_dynamics/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.

## Scenarios

```
rsf > use creds/cameras/american_dynamics/ftp_default_creds
rsf (American Dynamics Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (American Dynamics Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
38 changes: 38 additions & 0 deletions docs/modules/creds/cameras/american_dynamics/ssh_default_creds.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
## Description

Module performs dictionary attack with default credentials against American Dynamics Camera SSH service.
If valid credentials are found, they are displayed to the user.

## Verification Steps

1. Start `./rsf.py`
2. Do: `use creds/cameras/american_dynamics/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.

## Scenarios

```
rsf > use creds/cameras/american_dynamics/ssh_default_creds
rsf (American Dynamics Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (American Dynamics Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
## Description

Module performs dictionary attack with default credentials against American Dynamics Camera Telnet service.
If valid credentials are found, they are displayed to the user.

## Verification Steps

1. Start `./rsf.py`
2. Do: `use creds/cameras/american_dynamics/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.

## Scenarios

```
rsf > use creds/cameras/american_dynamics/telnet_default_creds
rsf (American Dynamics Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (American Dynamics Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
38 changes: 38 additions & 0 deletions docs/modules/creds/cameras/arecont/ftp_default_creds.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
## Description

Module performs dictionary attack with default credentials against Arecont Camera FTP service.
If valid credentials are found, they are displayed to the user.

## Verification Steps

1. Start `./rsf.py`
2. Do: `use creds/cameras/arecont/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.

## Scenarios

```
rsf > use creds/cameras/arecont/ftp_default_creds
rsf (Arecont Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Arecont Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
38 changes: 38 additions & 0 deletions docs/modules/creds/cameras/arecont/ssh_default_creds.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
## Description

Module performs dictionary attack with default credentials against Arecont Camera SSH service.
If valid credentials are found, they are displayed to the user.

## Verification Steps

1. Start `./rsf.py`
2. Do: `use creds/cameras/arecont/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.

## Scenarios

```
rsf > use creds/cameras/arecont/ssh_default_creds
rsf (Arecont Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Arecont Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
38 changes: 38 additions & 0 deletions docs/modules/creds/cameras/arecont/telnet_default_creds.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
## Description

Module performs dictionary attack with default credentials against Arecont Camera Telnet service.
If valid credentials are found, they are displayed to the user.

## Verification Steps

1. Start `./rsf.py`
2. Do: `use creds/cameras/arecont/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.

## Scenarios

```
rsf > use creds/cameras/arecont/telnet_default_creds
rsf (Arecont Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Arecont Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
38 changes: 38 additions & 0 deletions docs/modules/creds/cameras/avigilon/ftp_default_creds.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
## Description

Module performs dictionary attack with default credentials against Avigilon Camera FTP service.
If valid credentials are found, they are displayed to the user.

## Verification Steps

1. Start `./rsf.py`
2. Do: `use creds/cameras/avigilon/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.

## Scenarios

```
rsf > use creds/cameras/avigilon/ftp_default_creds
rsf (Avigilon Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Avigilon Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
Loading

0 comments on commit ed19c56

Please sign in to comment.