Embedded device hacking
Intelligent Platform Management Interface (IPMI) is a technology that gives administrators almost total control over remotely deployed servers.
IPMI may be found in most of the corporates while doing pentest. In this recipe, we will see how vulnerabilities in IPMI devices can be found.
How to do it...
To learn about IPMI follow the given steps:
- We start Metasploit:
- We search for IPMI-related exploits using this command:
search ipmi
The following screenshot shows the output for the preceding command:
- We will use the IPMI 2.0 RAKP Remote SHA1 Password Hash Retrieval vulnerability; we choose the auxiliary. There are multiple exploits, such as CIPHER Zero, which can be tried as well:
use auxiliary/scanner/ipmi/ipmi_dumphashes
- Next, in order to see the options, we type this:
show options
The following screenshot shows the output for the preceding command:
- Here, we see that the auxiliary automatically attempts to crack the hashes it retrieves. We set RHOSTS...