IPMI (623)
Footprinting using NMAP
sudo nmap -sU --script ipmi-version -p 623 ilo.inlanfreight.localMetasploit version scan
use auxiliary/scanner/ipmi/ipmi_versionFlaw in RAKP protocol in IPMI 2.0
hashcat -m 7300 ipmi.txt -a 3 ?1?1?1?1?1?1?1?1 -1 ?d?uCracking using hashcat (input wordlist)
hashcat -m 7300 ipmi.txt /usr/share/wordlists/rockyou.txtuse auxiliary/scanner/ipmi/ipmi_dumphashes Default passwords
Last updated