kuteminh11 / Monitoring-Systems-Cheat-Sheet

A cheat sheet for pentesters and researchers about vulnerabilities in well-known monitoring systems.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Monitoring-Systems-Cheat-Sheet

A cheat sheet for pentesters and researchers about exploitation well-known monitoring systems.

Exploring

M'kay kiddo, you found monitoring system and now think what you can do about it, right? My advice to you, first find out the version of the system and try to log in using the default credentials.

Version Check

Zabbix/Nagios version checker

Cacti version checker

Default Credentials

SSH Credentials Database Credentials Web Credentials Port
Zabbix <= 2.4 root/zabbix zabbix/zabbix root/zabbix zabbix/zabbix Admin/zabbix admin/admin 10050 10051
Zabbix >= 3.0 appliance/zabbix zabbix/zabbix Admin/zabbix Admin/Admin 10050 10051
Nagios root/nagiosxi -- nagiosadmin/nagios nagiosadmin/nagiosadmin 5666
Cacti -- cactiuser/cactiuser admin/admin 80 443 8080

Exploits

Admin has changed default passwords? Aww, maybe he forgot to update the system. Now check known vulnerabilities.

NagiosXI Version
NRPE RCE 5.2.8<=
Chained RCE 5.2.7<=
Zabbix Version
Command Execution 1.7.4<=
Cacti Version
SQL Injection 0.8.8g<=
SQL Injection 0.8.8f
SQL Injection 0.8.8f
SQL Injection 0.8.8d
SQL Injection 0.8.8c
Reflected XSS 0.8.8b
SQL Injection 0.8.8b
Reflected XSS 1.1.12
Reflected XSS 1.1.13
Path Traversal 1.1.15
RCE 1.1.15
Reflected XSS 1.1.15
Reflected XSS 1.1.17
Stored XSS 1.1.17
Reflected XSS 1.1.23
RCE 1.1.27
AFR+RCE 1.1.27

Postexploitation

You are successfully logged in and don't know what to do then? This topic is for you boiiii.

NagiosXI

Spawning PHP Shell via component uploading

XSS -> RCE vector. Spawning shell via JS execution (worked on NagiosXI <= 5.4.12)

RCE on Monitored Hosts through the NRPE(<= 2.14) plugin

About

A cheat sheet for pentesters and researchers about vulnerabilities in well-known monitoring systems.