All Projects → nnposter → Nndefaccts

nnposter / Nndefaccts

Licence: other
nnposter's alternate fingerprint dataset for Nmap script http-default-accounts

Programming Languages

lua
6591 projects

Projects that are alternatives of or similar to Nndefaccts

Faraday
Faraday introduces a new concept - IPE (Integrated Penetration-Test Environment) a multiuser Penetration test IDE. Designed for distributing, indexing, and analyzing the data generated during a security audit.
Stars: ✭ 3,198 (+1676.67%)
Mutual labels:  penetration-testing, security-audit, nmap
default-http-login-hunter
Login hunter of default credentials for administrative web interfaces leveraging NNdefaccts dataset.
Stars: ✭ 285 (+58.33%)
Mutual labels:  security-audit, nmap, penetration-testing
Badkarma
network reconnaissance toolkit
Stars: ✭ 353 (+96.11%)
Mutual labels:  penetration-testing, security-audit, nmap
Reconnoitre
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (+913.33%)
Mutual labels:  penetration-testing, security-audit, nmap
Vulscan
Advanced vulnerability scanning with Nmap NSE
Stars: ✭ 2,305 (+1180.56%)
Mutual labels:  penetration-testing, security-audit, nmap
Zap Cli
A simple tool for interacting with OWASP ZAP from the commandline.
Stars: ✭ 166 (-7.78%)
Mutual labels:  penetration-testing, security-audit
Vhostscan
A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Stars: ✭ 767 (+326.11%)
Mutual labels:  penetration-testing, security-audit
Recsech
Recsech is a tool for doing Footprinting and Reconnaissance on the target web. Recsech collects information such as DNS Information, Sub Domains, HoneySpot Detected, Subdomain takeovers, Reconnaissance On Github and much more you can see in Features in tools .
Stars: ✭ 173 (-3.89%)
Mutual labels:  penetration-testing, security-audit
Vsaudit
VOIP Security Audit Framework
Stars: ✭ 97 (-46.11%)
Mutual labels:  penetration-testing, security-audit
Scantron
A distributed nmap / masscan scanning framework complete with an API client for automation workflows
Stars: ✭ 542 (+201.11%)
Mutual labels:  penetration-testing, nmap
Resources
A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-65.56%)
Mutual labels:  penetration-testing, security-audit
Horn3t
Powerful Visual Subdomain Enumeration at the Click of a Mouse
Stars: ✭ 120 (-33.33%)
Mutual labels:  penetration-testing, security-audit
Gorsair
Gorsair hacks its way into remote docker containers that expose their APIs
Stars: ✭ 678 (+276.67%)
Mutual labels:  penetration-testing, nmap
Habu
Hacking Toolkit
Stars: ✭ 635 (+252.78%)
Mutual labels:  penetration-testing, security-audit
Dsinternals
Directory Services Internals (DSInternals) PowerShell Module and Framework
Stars: ✭ 776 (+331.11%)
Mutual labels:  penetration-testing, security-audit
Easy hack
Hack the World using Termux
Stars: ✭ 549 (+205%)
Mutual labels:  penetration-testing, nmap
Pentest Notes
Collection of Pentest Notes and Cheatsheets from a lot of repos (SofianeHamlaoui,dostoevsky,mantvydasb,adon90,BriskSec)
Stars: ✭ 89 (-50.56%)
Mutual labels:  penetration-testing, security-audit
Trigmap
A wrapper for Nmap to quickly run network scans
Stars: ✭ 132 (-26.67%)
Mutual labels:  penetration-testing, nmap
Nosqlmap
Automated NoSQL database enumeration and web application exploitation tool.
Stars: ✭ 1,928 (+971.11%)
Mutual labels:  penetration-testing, security-audit
Pwndoc
Pentest Report Generator
Stars: ✭ 417 (+131.67%)
Mutual labels:  penetration-testing, security-audit

NNdefaccts

[n-n-ˈdē-ˌfekts] (pun intended)

TL;DR

NNdefaccts is nnposter's alternate fingerprint dataset for Nmap script http-default-accounts.

Synopsis

$ nmap --script http-default-accounts -p 80 192.168.1.1
...
PORT   STATE SERVICE
80/tcp open  http
| http-default-accounts:
|   [Cacti] at /
|     admin:admin
|   [Nagios] at /nagios/
|_    nagiosadmin:CactiEZ

Overview

One of Nmap scripts, http-default-accounts, can be used to test a web target for presence of default credentials specific to various platforms, applications, and management interfaces. The script relies on a fingerprint dataset for correctly identifying the target and performing a login sequence.

Nmap comes with its own default fingerprint dataset; there is no inherent necessity to seek an alternative, such as this one. The key difference is that the NNdefaccts dataset is much larger so many more target types can be tested. Note though that this dataset is not provided, licensed, supported or endorsed by the Nmap project.

To various degrees, checking for default credentials is possible with other well-recognized tools besides Nmap: Metasploit, OpenVAS, Nessus, Qualys, Nexpose, Acunetix, and similar. Based on our evaluation, Nmap with the NNdefaccts dataset is one of the best with respect to web interfaces. Compared to some, it is an order of magnitude difference.

Besides good coverage, scanning for default usernames and passwords with Nmap and the NNdefaccts dataset is straightforward, lightweight, and fast. A target on a local network can be typically tested in less than 30 seconds from start to finish.

Installation, Usage

The dataset requires Nmap 7.60 or higher. For best results please use Nmap 7.80 or build it fresh from its code repository.

For simple one-off use, just copy file http-default-accounts-fingerprints-nndefaccts.lua to your home directory and, instead of running:

nmap --script http-default-accounts -p 80 192.168.1.1

add --script-args http-default-accounts.fingerprintfile=... to the command line:

nmap --script http-default-accounts --script-args http-default-accounts.fingerprintfile=~/http-default-accounts-fingerprints-nndefaccts.lua -p 80 192.168.1.1

For more permanent use, you might consider replacing the default fingerprint dataset with this one. The default dataset is typically installed as /usr/share/nmap/nselib/data/http-default-accounts-fingerprints.lua on Linux or %ProgramFiles(x86)%\Nmap\nselib\data\http-default-accounts-fingerprints.lua on Windows.

Support

For help with running script http-default-accounts or Nmap in general, see https://nmap.org/.

For issues specific to NNdefaccts, see below.

Contributing

Contributions are appreciated but please review the rest of the section first.

Bug Reports

Identifying and reporting issues in the dataset is highly valuable. If you believe that you have found a defect, please make sure that you are using the latest version of the dataset and review currently open issues on GitHub to verify that the defect has not been already submitted. If not, create a new issue and be as specific as possible to help with reproducing the problem.

In many cases it is necessary to capture and inspect relevant HTTP traffic in detail. Please use ZAP, Fiddler or Burp to capture the traffic and send the resulting session/project file to nndefaccts /at/ shared-files.de, referencing the issue. (Do not upload the file to GitHub because of its potentially sensitive content.)

Code Contributions

Patches for fixing defects are welcome. Please note that by submitting any code related to the dataset to the NNdefaccts repository or passing it onto nnposter by other means you are assumed to have granted nnposter unlimited, irrevocable, perpetual non-exclusive license to the code, including reuse, modification, and relicensing.

Fingerprint Contributions

All fingerprints included in the dataset are developed and quality-tested against real targets. As a result, it is not currently possible to contribute new fingerprints directly, as a code. If your particular target is not covered by the dataset but you have access to a target instance and able to log in with its default credentials then you can instead contribute by submitting an HTTP session file, capturing the login.

Please send a Fiddler, Burp or ZAP session file to nndefaccts /at/ shared-files.de, prepared as follows:

  1. Close any browser tabs with the target loaded.
  2. Clear your browser cache, cookies, and local storage.
  3. Visit the target top (home) page, navigate to the login page, and log in with the correct default username but obviously wrong password, such as "wrongpassword".
  4. Repeat the first three steps but log in with the correct username and password.
  5. Name the file vendor-product-version, such as Apache-Tomcat-8.0.saz. (Extension .saz is used by Fiddler.)
  6. Send it to the above-mentioned e-mail.

As a much less preferred alternative to Fiddler, Burp, and ZAP, if the target device is using plain HTTP, not HTTPS, then you could also capture the network traffic generated by the above-mentioned steps into a pcap/pcapng file with a tool like Wireshark or Tcpdump and e-mail this file instead.

Author, License

NNdefaccts is Copyright (c) 2012-2021 by nnposter (nnposter /at/ users.sourceforge.net, https://github.com/nnposter), a party separate from Fyodor, Nmap Project, and Insecure.Com, LLC.

NNdefaccts is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.

For details see the full license at COPYING.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].