{"uuid": "351cae77-2c72-41a7-99ac-e4527da23fc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2017-12542", "type": "seen", "source": "https://t.me/ETHICALHACKERSCOMMUNITY2/3830", "content": "\"DICOM Server Response\" port:104 GaugeTech Electricity Meters \"Server: EIG Embedded Web Server\" \"200 Document follows\" Siemens Industrial Automation \"Siemens, SIMATIC\" port:161 Siemens HVAC Controllers \"Server: Microsoft-WinCE\" \"Content-Length: 12581\" Door / Lock Access Controllers \"HID VertX\" port:4070 Railroad Management \"log off\" \"select the appropriate\" Tesla Powerpack charging Status: Helps to find the charging status of tesla powerpack. http.title:\"Tesla PowerPack System\" http.component:\"d3\" -ga3ca4f2 XZERES Wind Turbine title:\"xzeres wind\" PIPS Automated (https://www.kitploit.com/search/label/Automated) License Plate Reader \"html:\"PIPS Technology ALPR Processors\"\" Modbus \"port:502\" Niagara Fox \"port:1911,4911 product:Niagara\" GE-SRTP \"port:18245,18246 product:\"general electric\"\" MELSEC-Q \"port:5006,5007 product:mitsubishi\" CODESYS \"port:2455 operating system\" S7 \"port:102\" BACnet \"port:47808\" HART-IP \"port:5094 hart-ip\" Omron FINS \"port:9600 response code\" IEC 60870-5-104 \"port:2404 asdu address\" DNP3 \"port:20000 source address\" EtherNet/IP \"port:44818\" PCWorx \"port:1962 PLC\" Crimson v3.0 \"port:789 product:\"Red Lion Controls\" ProConOS \"port:20547 PLC\" Remote Desktop Unprotected VNC \"authentication disabled\" port:5900,5901 \"authentication disabled\" \"RFB 003.008\" Windows RDP 99.99% are secured by a secondary Windows login screen. \"\\x03\\x00\\x00\\x0b\\x06\\xd0\\x00\\x00\\x124\\x00\" C2 Infrastructure CobaltStrike Servers product:\"cobalt strike team server\" product:\"Cobalt Strike Beacon\" ssl.cert.serial:146473198 - default certificate serial number ssl.jarm:07d14d16d21d21d07c42d41d00041d24a458a375eef0c576d23a7bab9a9fb1 ssl:foren.zik Brute Ratel http.html_hash:-1957161625 product:\"Brute Ratel C4\" Covenant ssl:\"Covenant\" http.component:\"Blazor\" Metasploit ssl:\"MetasploitSelfSignedCA\" Network Infrastructure Hacked routers: Routers which got compromised hacked-router-help-sos Redis open instances product:\"Redis key-value store\" Citrix: Find Citrix Gateway. title:\"citrix gateway\" Weave Scope Dashboards Command-line access inside Kubernetes (https://www.kitploit.com/search/label/Kubernetes) pods and Docker containers, and real-time visualization/monitoring of the entire infrastructure. title:\"Weave Scope\" http.favicon.hash:567176827 Jenkins CI \"X-Jenkins\" \"Set-Cookie: JSESSIONID\" http.title:\"Dashboard\" Jenkins: Jenkins Unrestricted Dashboard x-jenkins 200 Docker APIs \"Docker Containers:\" port:2375 Docker Private Registries \"Docker-Distribution-Api-Version: registry\" \"200 OK\" -gitlab Pi-hole Open DNS Servers \"dnsmasq-pi-hole\" \"Recursion: enabled\" DNS Servers with recursion \"port: 53\" Recursion: Enabled Already Logged-In as root via Telnet \"root@\" port:23 -login -password -name -Session Telnet Access: NO password required for telnet access. port:23 console gateway Polycom video-conference system no-auth shell \"polycom command shell\" NPort serial-to-eth / MoCA devices without password nport -keyin port:23 Android Root Bridges A tangential result of Google's sloppy fractured update approach. \ud83d\ude44 More information here. \"Android Debug Bridge\" \"Device\" port:5555 Lantronix Serial-to-Ethernet Adapter Leaking Telnet Passwords Lantronix password port:30718 -secured Citrix Virtual Apps \"Citrix Applications:\" port:1604 Cisco Smart Install Vulnerable (kind of \"by design,\" but especially when exposed). \"smart install client active\" PBX IP Phone Gateways PBX \"gateway console\" -password port:23 Polycom Video Conferencing http.title:\"- Polycom\" \"Server: lighttpd\" \"Polycom Command Shell\" -failed port:23 Telnet Configuration: \"Polycom Command Shell\" -failed port:23 Example: Polycom Video Conferencing Bomgar Help Desk Portal \"Server: Bomgar\" \"200 OK\" Intel Active Management (https://www.kitploit.com/search/label/Management) CVE-2017-5689 \"Intel(R) Active Management Technology\" port:623,664,16992,16993,16994,16995 \"Active Management Technology\" HP iLO 4 CVE-2017-12542 HP-ILO-4 !\"HP-ILO-4/2.53\" !\"HP-ILO-4/2.54\" !\"HP-ILO-4/2.55\" !\"HP-ILO-4/2.60\" !\"HP-ILO-4/2.61\"", "creation_timestamp": "2024-03-18T12:04:27.000000Z"}