Coder Social home page Coder Social logo

nnposter / nndefaccts Goto Github PK

View Code? Open in Web Editor NEW
238.0 13.0 89.0 1.29 MB

nnposter's alternate fingerprint dataset for Nmap script http-default-accounts

License: GNU General Public License v3.0

Lua 100.00%
default-password default-credentials nmap penetration-testing security-audit

nndefaccts's Introduction

NNdefaccts

[n-n-ˈdē-ˌfekts] (pun intended)

TL;DR

NNdefaccts is nnposter's alternate fingerprint dataset for Nmap script http-default-accounts.

Synopsis

$ nmap --script http-default-accounts -p 80 192.168.1.1
...
PORT   STATE SERVICE
80/tcp open  http
| http-default-accounts:
|   [Cacti] at /
|     admin:admin
|   [Nagios] at /nagios/
|_    nagiosadmin:CactiEZ

Overview

One of Nmap scripts, http-default-accounts, can be used to test a web target for presence of default credentials specific to various platforms, applications, and management interfaces. The script relies on a fingerprint dataset for correctly identifying the target and performing a login sequence.

Nmap comes with its own default fingerprint dataset; there is no inherent necessity to seek an alternative, such as this one. The key difference is that the NNdefaccts dataset is much larger so many more target types can be tested. Note though that this dataset is not provided, licensed, supported or endorsed by the Nmap project.

To various degrees, checking for default credentials is possible with other well-recognized tools besides Nmap: Metasploit, OpenVAS, Nessus, Qualys, Nexpose, Acunetix, and similar. Based on our evaluation, Nmap with the NNdefaccts dataset is one of the best with respect to web interfaces. Compared to some, it is an order of magnitude difference.

Besides good coverage, scanning for default usernames and passwords with Nmap and the NNdefaccts dataset is straightforward, lightweight, and fast. A target on a local network can be typically tested in less than 30 seconds from start to finish.

Installation, Usage

The dataset requires Nmap 7.60 or higher. For best results please use Nmap 7.80 or build it fresh from its code repository.

For simple one-off use, just copy file http-default-accounts-fingerprints-nndefaccts.lua to your home directory and, instead of running:

nmap --script http-default-accounts -p 80 192.168.1.1

add --script-args http-default-accounts.fingerprintfile=... to the command line:

nmap --script http-default-accounts --script-args http-default-accounts.fingerprintfile=~/http-default-accounts-fingerprints-nndefaccts.lua -p 80 192.168.1.1

For more permanent use, you might consider replacing the default fingerprint dataset with this one. The default dataset is typically installed as /usr/share/nmap/nselib/data/http-default-accounts-fingerprints.lua on Linux or %ProgramFiles(x86)%\Nmap\nselib\data\http-default-accounts-fingerprints.lua on Windows.

Support

For help with running script http-default-accounts or Nmap in general, see https://nmap.org/.

For issues specific to NNdefaccts, see below.

Contributing

Contributions are appreciated but please review the rest of the section first.

Bug Reports

Identifying and reporting issues in the dataset is highly valuable. If you believe that you have found a defect, please make sure that you are using the latest version of the dataset and review currently open issues on GitHub to verify that the defect has not been already submitted. If not, create a new issue and be as specific as possible to help with reproducing the problem.

In many cases it is necessary to capture and inspect relevant HTTP traffic in detail. Please use ZAP, Fiddler or Burp to capture the traffic and send the resulting session/project file to nndefaccts /at/ shared-files.de, referencing the issue. (Do not upload the file to GitHub because of its potentially sensitive content.)

Code Contributions

Patches for fixing defects are welcome. Please note that by submitting any code related to the dataset to the NNdefaccts repository or passing it onto nnposter by other means you are assumed to have granted nnposter unlimited, irrevocable, perpetual non-exclusive license to the code, including reuse, modification, and relicensing.

Fingerprint Contributions

All fingerprints included in the dataset are developed and quality-tested against real targets. As a result, it is not currently possible to contribute new fingerprints directly, as a code. If your particular target is not covered by the dataset but you have access to a target instance and able to log in with its default credentials then you can instead contribute by submitting an HTTP session file, capturing the login.

Please send a Fiddler, Burp or ZAP session file to nndefaccts /at/ shared-files.de, prepared as follows:

  1. Close any browser tabs with the target loaded.
  2. Clear your browser cache, cookies, and local storage.
  3. Visit the target top (home) page, navigate to the login page, and log in with the correct default username but obviously wrong password, such as "wrongpassword".
  4. Repeat the first three steps but log in with the correct username and password.
  5. Name the file vendor-product-version, such as Apache-Tomcat-8.0.saz. (Extension .saz is used by Fiddler.)
  6. Send it to the above-mentioned e-mail.

As a much less preferred alternative to Fiddler, Burp, and ZAP, if the target device is using plain HTTP, not HTTPS, then you could also capture the network traffic generated by the above-mentioned steps into a pcap/pcapng file with a tool like Wireshark or Tcpdump and e-mail this file instead.

Author, License

NNdefaccts is Copyright (c) 2012-2024 by nnposter (nnposter /at/ users.sourceforge.net, https://github.com/nnposter), a party separate from Fyodor, Nmap Project, and Insecure.Com, LLC.

NNdefaccts is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.

For details see the full license at COPYING.

nndefaccts's People

Contributors

nnposter avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

nndefaccts's Issues

How to Extract(host(url), username, password)?

The tool you wrote is really beautiful. How can we save the default information as host(url), username, password in a file. Internal network tests can yield a lot of results. It is really difficult to extract this result.
Sample output

url,username,password
http://10.2.14.221:80,admin,123456
http://10.1.3.52:8087/manager/html,admin,123456

Supply additional password via script-args?

Is it possible to supply an additional password to check via a --script-args?

My use case is to run an nmap internally against our known deployed printers/scanners. However, we are also aware of some weak custom passwords that were previously deployed in the environment and want to check for those too.

I see that login_combos variable is used to hold the username/password's to check. Would it be possible to make this something that can be appended to via a --script-args? I am not terribly well versed in lua, but if this is technically feasible I would love to make this a possibility.

Dell iDRAC6/7 (Mbedthis): doesn't work on HTTP

Dell iDRAC 6/7 seems to be listening by default on HTTP and HTTPS. HTTP is only a redirection to HTTPS and doesn't accept authentication requests.
Currently we get this which isn't very neat:

PORT    STATE SERVICE REASON
80/tcp  open  http    syn-ack ttl 128
| http-default-accounts: 
|   [Dell iDRAC6/7 (Mbedthis)] at /
|_    (no valid default credentials found)
443/tcp open  https   syn-ack ttl 128
| http-default-accounts: 
|   [Dell iDRAC6/7 (Mbedthis)] at /
|_    root:calvin

I have a few ideas to improve this but nothing that satisfies me 100%. Maybe you'll have better ones :)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.