|
| 1 | +## Description |
| 2 | + |
| 3 | +This module attempts to log into DirectAdmin Web Control Panel. DirectAdmin Web Control Panel is commercial application for remote administration of Web server's. Gaining privileged access to DirectAdmin can lead to remote code execution via their upload utility, or sensitive information disclosure such as access to database backups. |
| 4 | + |
| 5 | +## Vulnerable Application |
| 6 | + |
| 7 | +[DirectAdmin Website](https://www.directadmin.com/) |
| 8 | +[Demo Information]( https://www.directadmin.com/demo.php) |
| 9 | + |
| 10 | +## Verification Steps |
| 11 | + |
| 12 | +1. Do: ```use auxiliary/scanner/http/directadmin_login``` |
| 13 | +2. Do: ```set RHOSTS [IP]``` |
| 14 | +3. Do: ```set RPORT [PORT]``` |
| 15 | +4. Do: Set credentials |
| 16 | +5. Do: ```run``` |
| 17 | +6. You should see the module attempting to log in. |
| 18 | + |
| 19 | +## Scenarios |
| 20 | + |
| 21 | +### Attempt to login with the default credentials. |
| 22 | + |
| 23 | +``` |
| 24 | +msf > use auxiliary/scanner/http/directadmin_login |
| 25 | +msf auxiliary(scanner/http/directadmin_login) > set RHOSTS 10.0.0.39 |
| 26 | +RHOSTS => 10.0.0.39 |
| 27 | +msf auxiliary(scanner/http/directadmin_login) > set username demo_admin |
| 28 | +username => demo_admin |
| 29 | +msf auxiliary(scanner/http/directadmin_login) > set password demo |
| 30 | +password => demo |
| 31 | +msf auxiliary(scanner/http/directadmin_login) > run |
| 32 | +
|
| 33 | +[+] 10.0.0.39:2222 - Success: 'demo_admin:demo' |
| 34 | +[*] Scanned 1 of 1 hosts (100% complete) |
| 35 | +[*] Auxiliary module execution completed |
| 36 | +msf auxiliary(scanner/http/directadmin_login) > |
| 37 | +``` |
| 38 | + |
| 39 | +### Brute force with credentials from file. |
| 40 | + |
| 41 | +``` |
| 42 | +msf > use auxiliary/scanner/http/directadmin_login |
| 43 | +msf auxiliary(directadmin_login) > set RHOSTS 10.0.0.39 |
| 44 | +RHOSTS => 10.0.0.39 |
| 45 | +msf auxiliary(directadmin_login) > set USERPASS_FILE ~/DirectAdminCreds.txt |
| 46 | +USERPASS_FILE => ~/BuildMasterCreds.txt |
| 47 | +msf auxiliary(directadmin_login) > run |
| 48 | +
|
| 49 | +[*] 10.0.0.39:81 - Trying username:"Admin" with password:"test" |
| 50 | +[-] FAILED LOGIN - 10.0.0.39:81 - "Admin":"test" |
| 51 | +[*] 10.0.0.39:81 - Trying username:"Admin" with password:"wrong" |
| 52 | +[-] FAILED LOGIN - 10.0.0.39:81 - "Admin":"wrong" |
| 53 | +[*] 10.0.0.39:81 - Trying username:"Admin" with password:"Admin" |
| 54 | +[+] SUCCESSFUL LOGIN - 10.0.0.39:81 - "Admin":"Admin" |
| 55 | +[*] Scanned 1 of 1 hosts (100% complete) |
| 56 | +[*] Auxiliary module execution completed |
| 57 | +msf auxiliary(directadmin_login) > |
| 58 | +``` |
0 commit comments