Skip to content

Commit bb97467

Browse files
committed
docs for auxiliary/scanner/http/directadmin_login
1 parent 8de760f commit bb97467

File tree

1 file changed

+58
-0
lines changed

1 file changed

+58
-0
lines changed
Lines changed: 58 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,58 @@
1+
## Description
2+
3+
This module attempts to log into DirectAdmin Web Control Panel. DirectAdmin Web Control Panel is commercial application for remote administration of Web server's. Gaining privileged access to DirectAdmin can lead to remote code execution via their upload utility, or sensitive information disclosure such as access to database backups.
4+
5+
## Vulnerable Application
6+
7+
[DirectAdmin Website](https://www.directadmin.com/)
8+
[Demo Information]( https://www.directadmin.com/demo.php)
9+
10+
## Verification Steps
11+
12+
1. Do: ```use auxiliary/scanner/http/directadmin_login```
13+
2. Do: ```set RHOSTS [IP]```
14+
3. Do: ```set RPORT [PORT]```
15+
4. Do: Set credentials
16+
5. Do: ```run```
17+
6. You should see the module attempting to log in.
18+
19+
## Scenarios
20+
21+
### Attempt to login with the default credentials.
22+
23+
```
24+
msf > use auxiliary/scanner/http/directadmin_login
25+
msf auxiliary(scanner/http/directadmin_login) > set RHOSTS 10.0.0.39
26+
RHOSTS => 10.0.0.39
27+
msf auxiliary(scanner/http/directadmin_login) > set username demo_admin
28+
username => demo_admin
29+
msf auxiliary(scanner/http/directadmin_login) > set password demo
30+
password => demo
31+
msf auxiliary(scanner/http/directadmin_login) > run
32+
33+
[+] 10.0.0.39:2222 - Success: 'demo_admin:demo'
34+
[*] Scanned 1 of 1 hosts (100% complete)
35+
[*] Auxiliary module execution completed
36+
msf auxiliary(scanner/http/directadmin_login) >
37+
```
38+
39+
### Brute force with credentials from file.
40+
41+
```
42+
msf > use auxiliary/scanner/http/directadmin_login
43+
msf auxiliary(directadmin_login) > set RHOSTS 10.0.0.39
44+
RHOSTS => 10.0.0.39
45+
msf auxiliary(directadmin_login) > set USERPASS_FILE ~/DirectAdminCreds.txt
46+
USERPASS_FILE => ~/BuildMasterCreds.txt
47+
msf auxiliary(directadmin_login) > run
48+
49+
[*] 10.0.0.39:81 - Trying username:"Admin" with password:"test"
50+
[-] FAILED LOGIN - 10.0.0.39:81 - "Admin":"test"
51+
[*] 10.0.0.39:81 - Trying username:"Admin" with password:"wrong"
52+
[-] FAILED LOGIN - 10.0.0.39:81 - "Admin":"wrong"
53+
[*] 10.0.0.39:81 - Trying username:"Admin" with password:"Admin"
54+
[+] SUCCESSFUL LOGIN - 10.0.0.39:81 - "Admin":"Admin"
55+
[*] Scanned 1 of 1 hosts (100% complete)
56+
[*] Auxiliary module execution completed
57+
msf auxiliary(directadmin_login) >
58+
```

0 commit comments

Comments
 (0)