Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/ihebski/DefaultCreds-cheat-sheet
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
https://github.com/ihebski/DefaultCreds-cheat-sheet
blueteam bugbounty cheatsheet credentials-gathering cybersecurity default-password exploit infosec offensive-security pentest pentesting
Last synced: about 14 hours ago
JSON representation
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
- Host: GitHub
- URL: https://github.com/ihebski/DefaultCreds-cheat-sheet
- Owner: ihebski
- License: mit
- Created: 2021-01-01T19:02:36.000Z (almost 4 years ago)
- Default Branch: main
- Last Pushed: 2024-09-18T16:14:42.000Z (about 2 months ago)
- Last Synced: 2024-10-29T11:24:49.337Z (5 days ago)
- Topics: blueteam, bugbounty, cheatsheet, credentials-gathering, cybersecurity, default-password, exploit, infosec, offensive-security, pentest, pentesting
- Language: Python
- Homepage:
- Size: 577 KB
- Stars: 5,603
- Watchers: 87
- Forks: 686
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Contributing: CONTRIBUTING.md
- License: LICENSE
Awesome Lists containing this project
- awesome-bugbounty-tools - DefaultCreds-cheat-sheet - One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password (Miscellaneous / Passwords)
- awesome-hacking-lists - ihebski/DefaultCreds-cheat-sheet - One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️ (Python)
README
# Default Credentials Cheat Sheet
**One place for all the default credentials to assist pentesters during an engagement, this document has several products default login/password gathered from multiple sources.**
> P.S : Most of the credentials were extracted from changeme,routersploit and Seclists projects, you can use these tools to automate the process https://github.com/ztgrace/changeme , https://github.com/threat9/routersploit (kudos for the awesome work)
- [x] Project in progress
## Motivation
- One document for the most known vendors default credentials
- Assist pentesters during a pentest/red teaming engagement
- **Helping the Blue teamers to secure the company infrastructure assets by discovering this security flaw in order to mitigate it**. See
[OWASP Guide [WSTG-ATHN-02] - Testing_for_Default_Credentials](https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/04-Authentication_Testing/02-Testing_for_Default_Credentials "OWASP Guide")#### Short stats of the dataset
| | Product/Vendor | Username | Password |
| --- | --- | --- | --- |
| **count** | 3668 | 3668 | 3668 |
| **unique** | 1347 | 1110 | 1658 |
| **top** | Oracle| | |
| **freq** | 235 | 790 | 474 |#### Sources
- [Changeme](https://github.com/ztgrace/changeme "Changeme project")
- [Routersploit]( https://github.com/threat9/routersploit "Routersploit project")
- [betterdefaultpasslist]( https://github.com/govolution/betterdefaultpasslist "betterdefaultpasslist")
- [Seclists]( https://github.com/danielmiessler/SecLists/tree/master/Passwords/Default-Credentials "Seclist project")
- [ics-default-passwords](https://github.com/arnaudsoullie/ics-default-passwords) (thanks to @noraj)
- Vendors documentations/blogs## Installation & Usage
The Default Credentials Cheat Sheet tool is available on [pypi](https://pypi.org/project/defaultcreds-cheat-sheet/)
```bash
$ pip3 install defaultcreds-cheat-sheet
$ creds search tomcat
```| Operating System | Tested |
|---------------------|-------------------|
| Linux(Kali,Ubuntu,Lubuntu) | ✔️ |
| Windows(10,11) | ✔️ |
| macOS | ❌ |##### Manual Installation
```bash
$ git clone https://github.com/ihebski/DefaultCreds-cheat-sheet
$ pip3 install -r requirements.txt
$ cp creds /usr/bin/ && chmod +x /usr/bin/creds
$ creds search tomcat
```## Creds script
### Usage Guide
```bash
# Search for product creds
➤ creds search tomcat
+----------------------------------+------------+------------+
| Product | username | password |
+----------------------------------+------------+------------+
| apache tomcat (web) | tomcat | tomcat |
| apache tomcat (web) | admin | admin |
...
+----------------------------------+------------+------------+# Update records
➤ creds update
Check for new updates...🔍
New updates are available 🚧
[+] Download database...# Export Creds to files (could be used for brute force attacks)
➤ creds search tomcat export
+----------------------------------+------------+------------+
| Product | username | password |
+----------------------------------+------------+------------+
| apache tomcat (web) | tomcat | tomcat |
| apache tomcat (web) | admin | admin |
...
+----------------------------------+------------+------------+[+] Creds saved to /tmp/tomcat-usernames.txt , /tmp/tomcat-passwords.txt 📥
```**Run creds through proxy**
```bash
# Search for product creds
➤ creds search tomcat --proxy=http://localhost:8080# update records
➤ creds update --proxy=http://localhost:8080# Search for Tomcat creds and export results to /tmp/tomcat-usernames.txt , /tmp/tomcat-passwords.txt
➤ creds search tomcat --proxy=http://localhost:8080 export
```> **Proxy option** is only available from version 0.5.2
[![asciicast](https://asciinema.org/a/526599.svg)](https://asciinema.org/a/526599)
#### Pass Station[noraj][noraj] created CLI & library to search for default credentials among this database using `DefaultCreds-Cheat-Sheet.csv`.
The tool is named [Pass Station][pass-station] ([Doc][ps-doc]) and has some powerful search feature (fields, switches, regexp, highlight) and output (simple table, pretty table, JSON, YAML, CSV).[![asciicast](https://asciinema.org/a/397713.svg)](https://asciinema.org/a/397713)
[noraj]:https://pwn.by/noraj/
[pass-station]:https://github.com/sec-it/pass-station
[ps-doc]:https://sec-it.github.io/pass-station/## Contribute
If you cannot find the password for a specific product, please submit a pull request to update the dataset.
> ### Disclaimer
> **For educational purposes only, use it at your own responsibility.**