Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
R
routersploit
Overview
Overview
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
czos-dpend
routersploit
Commits
ed19c564
Unverified
Commit
ed19c564
authored
May 29, 2018
by
Marcin Bury
Committed by
GitHub
May 29, 2018
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Adding basic docs for creds modules (#443)
parent
d64359b8
Hide whitespace changes
Inline
Side-by-side
Showing
153 changed files
with
5702 additions
and
12 deletions
+5702
-12
PULL_REQUEST_TEMPLATE.md
.github/PULL_REQUEST_TEMPLATE.md
+1
-1
ftp_default_creds.md
docs/modules/creds/cameras/acti/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/cameras/acti/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/cameras/acti/telnet_default_creds.md
+38
-0
ftp_default_creds.md
...ules/creds/cameras/american_dynamics/ftp_default_creds.md
+38
-0
ssh_default_creds.md
...ules/creds/cameras/american_dynamics/ssh_default_creds.md
+38
-0
telnet_default_creds.md
...s/creds/cameras/american_dynamics/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/cameras/arecont/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/cameras/arecont/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/cameras/arecont/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/cameras/avigilon/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/cameras/avigilon/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/cameras/avigilon/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/cameras/avtech/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/cameras/avtech/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/cameras/avtech/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/cameras/axis/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/cameras/axis/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/cameras/axis/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/cameras/basler/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/cameras/basler/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/cameras/basler/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/cameras/brickcom/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/cameras/brickcom/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/cameras/brickcom/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/cameras/canon/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/cameras/canon/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/cameras/canon/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/cameras/cisco/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/cameras/cisco/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/cameras/cisco/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/cameras/dlink/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/cameras/dlink/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/cameras/dlink/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/cameras/geovision/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/cameras/geovision/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/cameras/geovision/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/cameras/grandstream/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/cameras/grandstream/ssh_default_creds.md
+38
-0
telnet_default_creds.md
...modules/creds/cameras/grandstream/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/cameras/hikvision/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/cameras/hikvision/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/cameras/hikvision/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/cameras/honeywell/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/cameras/honeywell/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/cameras/honeywell/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/cameras/iqinvision/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/cameras/iqinvision/ssh_default_creds.md
+38
-0
telnet_default_creds.md
.../modules/creds/cameras/iqinvision/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/cameras/jvc/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/cameras/jvc/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/cameras/jvc/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/cameras/mobotix/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/cameras/mobotix/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/cameras/mobotix/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/cameras/samsung/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/cameras/samsung/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/cameras/samsung/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/cameras/sentry360/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/cameras/sentry360/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/cameras/sentry360/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/cameras/siemens/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/cameras/siemens/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/cameras/siemens/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/cameras/speco/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/cameras/speco/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/cameras/speco/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/cameras/stardot/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/cameras/stardot/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/cameras/stardot/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/cameras/vacron/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/cameras/vacron/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/cameras/vacron/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/cameras/videoiq/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/cameras/videoiq/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/cameras/videoiq/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/routers/asmax/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/routers/asmax/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/routers/asmax/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/routers/asus/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/routers/asus/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/routers/asus/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/routers/belkin/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/routers/belkin/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/routers/belkin/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/routers/bhu/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/routers/bhu/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/routers/bhu/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/routers/billion/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/routers/billion/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/routers/billion/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/routers/cisco/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/routers/cisco/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/routers/cisco/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/routers/comtrend/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/routers/comtrend/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/routers/comtrend/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/routers/dlink/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/routers/dlink/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/routers/dlink/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/routers/fortinet/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/routers/fortinet/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/routers/fortinet/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/routers/huawei/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/routers/huawei/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/routers/huawei/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/routers/ipfire/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/routers/ipfire/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/routers/ipfire/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/routers/juniper/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/routers/juniper/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/routers/juniper/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/routers/linksys/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/routers/linksys/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/routers/linksys/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/routers/mikrotik/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/routers/mikrotik/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/routers/mikrotik/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/routers/movistar/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/routers/movistar/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/routers/movistar/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/routers/netcore/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/routers/netcore/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/routers/netcore/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/routers/netgear/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/routers/netgear/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/routers/netgear/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/routers/netsys/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/routers/netsys/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/routers/netsys/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/routers/pfsense/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/routers/pfsense/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/routers/pfsense/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/routers/technicolor/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/routers/technicolor/ssh_default_creds.md
+38
-0
telnet_default_creds.md
...modules/creds/routers/technicolor/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/routers/thomson/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/routers/thomson/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/routers/thomson/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/routers/tplink/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/routers/tplink/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/routers/tplink/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/routers/ubiquiti/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/routers/ubiquiti/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/routers/ubiquiti/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/routers/zte/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/routers/zte/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/routers/zte/telnet_default_creds.md
+38
-0
ftp_default_creds.md
docs/modules/creds/routers/zyxel/ftp_default_creds.md
+38
-0
ssh_default_creds.md
docs/modules/creds/routers/zyxel/ssh_default_creds.md
+38
-0
telnet_default_creds.md
docs/modules/creds/routers/zyxel/telnet_default_creds.md
+38
-0
dsl_2750b_rce.md
docs/modules/exploits/routers/dlink/dsl_2750b_rce.md
+1
-1
tox.ini
tox.ini
+0
-10
No files found.
.github/PULL_REQUEST_TEMPLATE.md
View file @
ed19c564
...
...
@@ -12,4 +12,4 @@ Provide steps to test or reproduce the PR.
-
[
]
`run`
-
[
]
...
-
[
]
Write tests (
[
Example
](
https://github.com/threat9/routersploit/blob/master/tests/exploits/routers/dlink/test_dsl_2750b_rce.py
)
)
-
[
]
Document how it works
-
[
]
Document how it works
(
[
Example
](
https://github.com/threat9/routersploit/blob/master/docs/modules/exploits/routers/dlink/dsl_2750b_rce.md
)
)
docs/modules/creds/cameras/acti/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Acti Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/acti/ftp_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/acti/ftp_default_creds
rsf (Acti Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Acti Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/cameras/acti/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Acti Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/acti/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/acti/ssh_default_creds
rsf (Acti Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Acti Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/cameras/acti/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Acti Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/acti/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/acti/telnet_default_creds
rsf (Acti Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Acti Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/cameras/american_dynamics/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against American Dynamics Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/american_dynamics/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/american_dynamics/ftp_default_creds
rsf (American Dynamics Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (American Dynamics Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/cameras/american_dynamics/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against American Dynamics Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/american_dynamics/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/american_dynamics/ssh_default_creds
rsf (American Dynamics Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (American Dynamics Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/cameras/american_dynamics/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against American Dynamics Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/american_dynamics/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/american_dynamics/telnet_default_creds
rsf (American Dynamics Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (American Dynamics Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/cameras/arecont/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Arecont Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/arecont/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/arecont/ftp_default_creds
rsf (Arecont Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Arecont Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/cameras/arecont/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Arecont Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/arecont/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/arecont/ssh_default_creds
rsf (Arecont Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Arecont Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/cameras/arecont/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Arecont Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/arecont/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/arecont/telnet_default_creds
rsf (Arecont Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Arecont Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/cameras/avigilon/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Avigilon Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/avigilon/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/avigilon/ftp_default_creds
rsf (Avigilon Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Avigilon Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/cameras/avigilon/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Avigilon Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/avigilon/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/avigilon/ssh_default_creds
rsf (Avigilon Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Avigilon Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/cameras/avigilon/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Avigilon Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/avigilon/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/avigilon/telnet_default_creds
rsf (Avigilon Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Avigilon Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/cameras/avtech/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Avtech Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/avtech/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/avtech/ftp_default_creds
rsf (Avtech Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Avtech Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/cameras/avtech/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Avtech Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/avtech/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/avtech/ssh_default_creds
rsf (Avtech Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Avtech Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/cameras/avtech/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Avtech Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/avtech/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/avtech/telnet_default_creds
rsf (Avtech Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Avtech Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/cameras/axis/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Axis Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/axis/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/axis/ftp_default_creds
rsf (Axis Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Axis Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/cameras/axis/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Axis Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/axis/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/axis/ssh_default_creds
rsf (Axis Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Axis Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/cameras/axis/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Axis Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/axis/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/axis/telnet_default_creds
rsf (Axis Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Axis Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/cameras/basler/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Basler Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/basler/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/basler/ftp_default_creds
rsf (Basler Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Basler Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/cameras/basler/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Basler Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/basler/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/brickcom/ssh_default_creds
rsf (Brickcom Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Brickcom Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/cameras/basler/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Basler Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/basler/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/dlink/telnet_default_creds
rsf (D-Link Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (D-Link Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/cameras/brickcom/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Brickcom Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/brickcom/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/brickcom/ftp_default_creds
rsf (Brickcom Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Brickcom Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/cameras/brickcom/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Brickcom Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/brickcom/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/brickcom/ssh_default_creds
rsf (Brickcom Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Brickcom Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/cameras/brickcom/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Brickcom Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/brickcom/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/brickcom/telnet_default_creds
rsf (Brickcom Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Brickcom Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/cameras/canon/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Canon Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/canon/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/canon/ftp_default_creds
rsf (Canon Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Canon Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/cameras/canon/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Canon Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/canon/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/canon/ssh_default_creds
rsf (Canon Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Canon Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/cameras/canon/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Canon Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/canon/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/canon/telnet_default_creds
rsf (Canon Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Canon Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/cameras/cisco/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Cisco Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/cisco/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/cisco/ftp_default_creds
rsf (Cisco Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Cisco Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/cameras/cisco/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Cisco Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/cisco/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/cisco/ssh_default_creds
rsf (Cisco Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Cisco Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/cameras/cisco/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Cisco Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/cisco/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/cisco/telnet_default_creds
rsf (Cisco Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Cisco Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/cameras/dlink/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against D-Link Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/dlink/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/dlink/ftp_default_creds
rsf (D-Link Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (D-Link Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/cameras/dlink/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against D-Link Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/dlink/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/dlink/ssh_default_creds
rsf (D-Link Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (D-Link Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/cameras/dlink/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against D-Link Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/dlink/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/dlink/telnet_default_creds
rsf (D-Link Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (D-Link Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/cameras/geovision/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against GeoVision Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/geovision/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/geovision/ftp_default_creds
rsf (GeoVision Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (GeoVision Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/cameras/geovision/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against GeoVision Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/geovision/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/geovision/ssh_default_creds
rsf (GeoVision Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (GeoVision Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/cameras/geovision/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against GeoVision Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/geovision/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/geovision/telnet_default_creds
rsf (GeoVision Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (GeoVision Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/cameras/grandstream/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Grandstream Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/grandstream/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/grandstream/ftp_default_creds
rsf (Grandstream Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Grandstream Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/cameras/grandstream/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Grandstream Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/grandstream/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/grandstream/ssh_default_creds
rsf (Grandstream Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Grandstream Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/cameras/grandstream/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Grandstream Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/grandstream/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/grandstream/telnet_default_creds
rsf (Grandstream Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Grandstream Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/cameras/hikvision/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Hikvision Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/hikvision/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/hikvision/ftp_default_creds
rsf (Hikvision Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Hikvision Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/cameras/hikvision/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Hikvision Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/hikvision/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/hikvision/ssh_default_creds
rsf (Hikvision Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Hikvision Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/cameras/hikvision/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Hikvision Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/hikvision/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/hikvision/telnet_default_creds
rsf (Hikvision Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Hikvision Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/cameras/honeywell/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Honeywell Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/honeywell/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/honeywell/ftp_default_creds
rsf (Honeywell Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Honeywell Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/cameras/honeywell/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Honeywell Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/honeywell/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/honeywell/ssh_default_creds
rsf (Honeywell Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Honeywell Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/cameras/honeywell/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Honeywell Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/honeywell/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/honeywell/telnet_default_creds
rsf (Honeywell Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Honeywell Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/cameras/iqinvision/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against IQInvision Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/iqinvision/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/iqinvision/ftp_default_creds
rsf (IQInvision Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (IQInvision Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/cameras/iqinvision/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against IQInvision Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/iqinvision/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/iqinvision/ssh_default_creds
rsf (IQInvision Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (IQInvision Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/cameras/iqinvision/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against IQInvision Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/iqinvision/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/iqinvision/telnet_default_creds
rsf (IQInvision Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (IQInvision Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/cameras/jvc/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against JVC Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/jvc/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/jvc/ftp_default_creds
rsf (JVC Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (JVC Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/cameras/jvc/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against JVC Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/jvc/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/jvc/ssh_default_creds
rsf (JVC Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (JVC Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/cameras/jvc/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against JVC Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/jvc/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/jvc/telnet_default_creds
rsf (JVC Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (JVC Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/cameras/mobotix/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Mobotix Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/mobotix/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/mobotix/ftp_default_creds
rsf (Mobotix Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Mobotix Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/cameras/mobotix/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Mobotix Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/mobotix/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/mobotix/ssh_default_creds
rsf (Mobotix Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Mobotix Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/cameras/mobotix/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Mobotix Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/mobotix/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/mobotix/telnet_default_creds
rsf (Mobotix Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Mobotix Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/cameras/samsung/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Samsung Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/samsung/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/samsung/ftp_default_creds
rsf (Samsung Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Samsung Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/cameras/samsung/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Samsung Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/samsung/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/samsung/ssh_default_creds
rsf (Samsung Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Samsung Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/cameras/samsung/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Samsung Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/samsung/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/samsung/telnet_default_creds
rsf (Samsung Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Samsung Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/cameras/sentry360/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Sentry360 Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/sentry360/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/sentry360/ftp_default_creds
rsf (Sentry360 Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Sentry360 Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/cameras/sentry360/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Sentry360 Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/sentry360/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/sentry360/ssh_default_creds
rsf (Sentry360 Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Sentry360 Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/cameras/sentry360/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Sentry360 Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/sentry360/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/sentry360/telnet_default_creds
rsf (Sentry360 Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Sentry360 Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/cameras/siemens/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Siemens Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/siemens/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/siemens/ftp_default_creds
rsf (Siemens Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Siemens Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/cameras/siemens/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Siemens Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/siemens/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/siemens/ssh_default_creds
rsf (Siemens Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Siemens Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/cameras/siemens/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Siemens Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/siemens/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/siemens/telnet_default_creds
rsf (Siemens Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Siemens Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/cameras/speco/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Speco Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/speco/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/speco/ftp_default_creds
rsf (Speco Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Speco Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/cameras/speco/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Speco Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/speco/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/speco/ssh_default_creds
rsf (Speco Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Speco Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/cameras/speco/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Speco Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/speco/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/speco/telnet_default_creds
rsf (Speco Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Speco Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/cameras/stardot/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Stardot Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/stardot/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/stardot/ftp_default_creds
rsf (Stardot Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Stardot Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/cameras/stardot/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Stardot Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/stardot/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/stardot/ssh_default_creds
rsf (Stardot Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Stardot Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/cameras/stardot/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Stardot Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/stardot/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/stardot/telnet_default_creds
rsf (Stardot Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Stardot Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/cameras/vacron/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Vacron Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/vacron/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/vacron/ftp_default_creds
rsf (Vacron Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Vacron Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/cameras/vacron/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Vacron Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/vacron/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/vacron/ssh_default_creds
rsf (Vacron Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Vacron Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/cameras/vacron/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Vacron Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/vacron/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/vacron/telnet_default_creds
rsf (Vacron Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Vacron Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/cameras/videoiq/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against VideoIQ Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/videoiq/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/videoiq/ftp_default_creds
rsf (VideoIQ Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (VideoIQ Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/cameras/videoiq/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against VideoIQ Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/videoiq/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/videoiq/ssh_default_creds
rsf (VideoIQ Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (VideoIQ Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/cameras/videoiq/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against VideoIQ Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/cameras/videoiq/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/videoiq/telnet_default_creds
rsf (VideoIQ Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (VideoIQ Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/routers/asmax/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Asmax Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/asmax/ftp_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/asmax/ftp_default_creds
rsf (Asmax Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Asmax Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/routers/asmax/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Asmax Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/asmax/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/asmax/ssh_default_creds
rsf (Asmax Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Asmax Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/routers/asmax/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Asmax Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/asmax/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/asmax/telnet_default_creds
rsf (Asmax Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Asmax Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/routers/asus/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Asus Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/asus/ftp_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/asus/ftp_default_creds
rsf (Asus Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Asus Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/routers/asus/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Asus Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/asus/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/asus/ssh_default_creds
rsf (Asus Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Asus Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/routers/asus/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Asus Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/asus/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/asus/telnet_default_creds
rsf (Asus Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Asus Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/routers/belkin/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Belkin Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/belkin/ftp_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/belkin/ftp_default_creds
rsf (Belkin Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Belkin Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/routers/belkin/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Belkin Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/belkin/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/belkin/ssh_default_creds
rsf (Belkin Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Belkin Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/routers/belkin/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Belkin Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/belkin/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/belkin/telnet_default_creds
rsf (Belkin Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Belkin Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/routers/bhu/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Bhu Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/bhu/ftp_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/bhu/ftp_default_creds
rsf (Bhu Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Bhu Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/routers/bhu/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Bhu Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/bhu/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/bhu/ssh_default_creds
rsf (Bhu Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Bhu Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/routers/bhu/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Bhu Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/bhu/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/bhu/telnet_default_creds
rsf (Bhu Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Bhu Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/routers/billion/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Billion Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/billion/ftp_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/billion/ftp_default_creds
rsf (Billion Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Billion Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/routers/billion/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Billion Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/billion/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/billion/ssh_default_creds
rsf (Billion Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Billion Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/routers/billion/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Billion Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/billion/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/billion/telnet_default_creds
rsf (Billion Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Billion Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/routers/cisco/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Cisco Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/cisco/ftp_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/cisco/ftp_default_creds
rsf (Cisco Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Cisco Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/routers/cisco/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Cisco Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/cisco/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/cisco/ssh_default_creds
rsf (Cisco Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Cisco Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/routers/cisco/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Cisco Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/cisco/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/cisco/telnet_default_creds
rsf (Cisco Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Cisco Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/routers/comtrend/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Comtrend Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/comtrend/ftp_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/comtrend/ftp_default_creds
rsf (Comtrend Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Comtrend Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/routers/comtrend/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Comtrend Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/comtrend/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/comtrend/ssh_default_creds
rsf (Comtrend Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Comtrend Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/routers/comtrend/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Comtrend Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/comtrend/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/comtrend/telnet_default_creds
rsf (Comtrend Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Comtrend Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/routers/dlink/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against D-Link Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/dlink/ftp_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/dlink/ftp_default_creds
rsf (D-Link Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (D-Link Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/routers/dlink/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against D-Link Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/dlink/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/dlink/ssh_default_creds
rsf (D-Link Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (D-Link Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/routers/dlink/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against D-Link Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/dlink/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/dlink/telnet_default_creds
rsf (D-Link Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (D-Link Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/routers/fortinet/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Fortined Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/fortinet/ftp_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/fortinet/ftp_default_creds
rsf (Fortinet Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Fortinet Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/routers/fortinet/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Fortinet Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/fortinet/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/fortinet/ssh_default_creds
rsf (Fortinet Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Fortinet Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/routers/fortinet/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Fortinet Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/fortinet/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/fortinet/telnet_default_creds
rsf (Fortinet Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Fortinet Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/routers/huawei/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Huawei Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/huawei/ftp_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/huawei/ftp_default_creds
rsf (Huawei Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Huawei Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/routers/huawei/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Huawei Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/huawei/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/huawei/ssh_default_creds
rsf (Huawei Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Huawei Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/routers/huawei/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Huawei Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/huawei/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/huawei/telnet_default_creds
rsf (Huawei Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Huawei Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/routers/ipfire/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against IPFire Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/ipfire/ftp_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/ipfire/ftp_default_creds
rsf (IPFire Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (IPFire Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/routers/ipfire/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against IPFire Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/ipfire/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/ipfire/ssh_default_creds
rsf (IPFire Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (IPFire Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/routers/ipfire/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against IPFire Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/ipfire/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/ipfire/telnet_default_creds
rsf (IPFire Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (IPFire Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/routers/juniper/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Juniper Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/juniper/ftp_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/juniper/ftp_default_creds
rsf (Juniper Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Juniper Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/routers/juniper/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Juniper Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/juniper/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/juniper/ssh_default_creds
rsf (Juniper Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Juniper Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/routers/juniper/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Juniper Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/juniper/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/juniper/telnet_default_creds
rsf (Juniper Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Juniper Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/routers/linksys/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Linksys Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/linksys/ftp_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/linksys/ftp_default_creds
rsf (Linksys Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Linksys Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/routers/linksys/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Linksys Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/linksys/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/linksys/ssh_default_creds
rsf (Linksys Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Linksys Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/routers/linksys/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Linksys Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/linksys/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/linksys/telnet_default_creds
rsf (Linksys Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Linksys Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/routers/mikrotik/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Mikrotik Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/mikrotik/ftp_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/mikrotik/ftp_default_creds
rsf (Mikrotik Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Mikrotik Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/routers/mikrotik/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Mikrotik Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/mikrotik/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/mikrotik/ssh_default_creds
rsf (Mikrotik Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Mikrotik Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/routers/mikrotik/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Mikrotik Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/mikrotik/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/mikrotik/telnet_default_creds
rsf (Mikrotik Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Mikrotik Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/routers/movistar/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Movistar Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/movistar/ftp_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/movistar/ftp_default_creds
rsf (Movistar Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Movistar Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/routers/movistar/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Movistar Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/movistar/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/movistar/ssh_default_creds
rsf (Movistar Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Movistar Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/routers/movistar/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Movistar Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/movistar/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/movistar/telnet_default_creds
rsf (Movistar Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Movistar Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/routers/netcore/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Netcore Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/netcore/ftp_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/netcore/ftp_default_creds
rsf (Netcore Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Netcore Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/routers/netcore/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Netcore Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/netcore/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/netcore/ssh_default_creds
rsf (Netcore Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Netcore Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/routers/netcore/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Netcore Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/netcore/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/netcore/telnet_default_creds
rsf (Netcore Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Netcore Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/routers/netgear/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Netgear Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/netgear/ftp_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/netgear/ftp_default_creds
rsf (Netgear Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Netgear Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/routers/netgear/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Netgear Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/netgear/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/netgear/ssh_default_creds
rsf (Netgear Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Netgear Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/routers/netgear/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Netgear Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/netgear/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/netgear/telnet_default_creds
rsf (Netgear Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Netgear Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/routers/netsys/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Netsys Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/netsys/ftp_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/netsys/ftp_default_creds
rsf (Netsys Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Netsys Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/routers/netsys/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Netsys Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/netsys/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/netsys/ssh_default_creds
rsf (Netsys Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Netsys Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/routers/netsys/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Netsys Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/netsys/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/netsys/telnet_default_creds
rsf (Netsys Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Netsys Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/routers/pfsense/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against PFSense Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/pfsense/ftp_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/pfsense/ftp_default_creds
rsf (PFSense Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (PFSense Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/routers/pfsense/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against PFSense Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/pfsense/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/pfsense/ssh_default_creds
rsf (PFSense Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (PFSense Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/routers/pfsense/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against PFSense Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/pfsense/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/pfsense/telnet_default_creds
rsf (PFSense Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (PFSense Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/routers/technicolor/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Technicolor Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/technicolor/ftp_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/technicolor/ftp_default_creds
rsf (Technicolor Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Technicolor Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/routers/technicolor/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Technicolor Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/technicolor/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/technicolor/ssh_default_creds
rsf (Technicolor Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Technicolor Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/routers/technicolor/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Technicolor Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/technicolor/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/technicolor/telnet_default_creds
rsf (Technicolor Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Technicolor Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/routers/thomson/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Thomson Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/thomson/ftp_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/thomson/ftp_default_creds
rsf (Thomson Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Thomson Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/routers/thomson/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Thomson Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/thomson/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/thomson/ssh_default_creds
rsf (Thomson Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Thomson Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/routers/thomson/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Thomson Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/thomson/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/thomson/telnet_default_creds
rsf (Thomson Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Thomson Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/routers/tplink/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against TP-Link Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/tplink/ftp_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/tplink/ftp_default_creds
rsf (TP-Link Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (TP-Link Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/routers/tplink/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against TP-Link Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/tplink/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/tplink/ssh_default_creds
rsf (TP-Link Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (TP-Link Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/routers/tplink/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against TP-Link Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/tplink/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/tplink/telnet_default_creds
rsf (TP-Link Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (TP-Link Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/routers/ubiquiti/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Ubiquiti Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/ubiquiti/ftp_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/ubiquiti/ftp_default_creds
rsf (Ubiquiti Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Ubiquiti Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/routers/ubiquiti/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Ubiquiti Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/ubiquiti/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/ubiquiti/ssh_default_creds
rsf (Ubiquiti Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Ubiquiti Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/routers/ubiquiti/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Ubiquiti Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/ubiquiti/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/ubiquiti/telnet_default_creds
rsf (Ubiquiti Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Ubiquiti Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/routers/zte/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against ZTE Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/zte/ftp_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/zte/ftp_default_creds
rsf (ZTE Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (ZTE Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/routers/zte/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against ZTE Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/zte/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/zte/ssh_default_creds
rsf (ZTE Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (ZTE Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/routers/zte/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against ZTE Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/zte/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/zte/telnet_default_creds
rsf (ZTE Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (ZTE Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/creds/routers/zyxel/ftp_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Zyxel Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/zyxel/ftp_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/zyxel/ftp_default_creds
rsf (Zyxel Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Zyxel Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
docs/modules/creds/routers/zyxel/ssh_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Zyxel Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/zyxel/ssh_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/zyxel/ssh_default_creds
rsf (Zyxel Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Zyxel Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
docs/modules/creds/routers/zyxel/telnet_default_creds.md
0 → 100644
View file @
ed19c564
## Description
Module performs dictionary attack with default credentials against Zyxel Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1.
Start
`./rsf.py`
2.
Do:
`use creds/routers/zyxel/telnet_default_creds`
3.
Do:
`set target [TargetIP]`
4.
Do:
`run`
5.
If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/zyxel/telnet_default_creds
rsf (Zyxel Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Zyxel Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
docs/modules/exploits/routers/dlink/dsl_2750b_rce.md
View file @
ed19c564
...
...
@@ -7,7 +7,7 @@ Vulnerable firmwares are 1.01 up to 1.03.
1. Start `./rsf.py`
2. Do: `use exploits/routers/dlink/dsl_2750b_rce`
3. Do: `set target [
Router
IP]`
3. Do: `set target [
Target
IP]`
4. Do: `run`
5. If router is vulnerable, it should be possible to execute commands on operating system level.
...
...
tox.ini
deleted
100644 → 0
View file @
d64359b8
[tox]
skipsdist
=
True
envlist
=
py36
[testenv]
deps
=
pytest
-r{toxinidir}/requirements.txt
commands
=
python -m pytest -n16 tests/
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment