base on One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️ # Default Credentials Cheat Sheet <p align="center"> <img src="https://media.moddb.com/cache/images/games/1/65/64034/thumb_620x2000/Lockpicking.jpg"/> </p> **One place for all the default credentials to assist pentesters/blue Teamers during engagements, featuring default login/password details for various products sourced from multiple references.** > P.S : Most of the credentials were extracted from changeme,routersploit and Seclists projects, you can use these tools to automate the process https://github.com/ztgrace/changeme , https://github.com/threat9/routersploit (kudos for the awesome work) - [x] Project in progress ## Motivation - One document for the most known vendors default credentials - Assist pentesters during a pentest/red teaming engagement - **Helping the Blue teamers to secure the company infrastructure assets by discovering this security flaw in order to mitigate it**. See [OWASP Guide [WSTG-ATHN-02] - Testing_for_Default_Credentials](https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/04-Authentication_Testing/02-Testing_for_Default_Credentials "OWASP Guide") #### Short stats of the dataset | | Product/Vendor | Username | Password | | --- | --- | --- | --- | | **count** | 3675 | 3675 | 3675 | | **unique** | 1367 | 1119 | 1673 | | **top** | Oracle| <blank> | <blank> | | **freq** | 235 | 796 | 473 | #### Sources - [Changeme](https://github.com/ztgrace/changeme "Changeme project") - [Routersploit]( https://github.com/threat9/routersploit "Routersploit project") - [betterdefaultpasslist]( https://github.com/govolution/betterdefaultpasslist "betterdefaultpasslist") - [Seclists]( https://github.com/danielmiessler/SecLists/tree/master/Passwords/Default-Credentials "Seclist project") - [ics-default-passwords](https://github.com/arnaudsoullie/ics-default-passwords) (thanks to @noraj) - Vendors documentations/blogs ## Installation & Usage The Default Credentials Cheat Sheet tool is available on [pypi](https://pypi.org/project/defaultcreds-cheat-sheet/) ```bash $ pip3 install defaultcreds-cheat-sheet $ creds search tomcat ``` | Operating System | Tested | |---------------------|-------------------| | Linux(Kali,Ubuntu,Lubuntu) | ✔️ | | Windows(10,11) | ✔️ | | macOS | ✔️ | ##### Manual Installation ```bash $ git clone https://github.com/ihebski/DefaultCreds-cheat-sheet $ pip3 install -r requirements.txt $ cp creds /usr/bin/ && chmod +x /usr/bin/creds $ creds search tomcat ``` ## Creds script ### Usage Guide ```bash # Search for product creds ➤ creds search tomcat +----------------------------------+------------+------------+ | Product | username | password | +----------------------------------+------------+------------+ | apache tomcat (web) | tomcat | tomcat | | apache tomcat (web) | admin | admin | ... +----------------------------------+------------+------------+ # Update records ➤ creds update Check for new updates...🔍 New updates are available 🚧 [+] Download database... # Export Creds to files (could be used for brute force attacks) ➤ creds search tomcat export +----------------------------------+------------+------------+ | Product | username | password | +----------------------------------+------------+------------+ | apache tomcat (web) | tomcat | tomcat | | apache tomcat (web) | admin | admin | ... +----------------------------------+------------+------------+ [+] Creds saved to /tmp/tomcat-usernames.txt , /tmp/tomcat-passwords.txt 📥 ``` **Run creds through proxy** ```bash # Search for product creds ➤ creds search tomcat --proxy=http://localhost:8080 # update records ➤ creds update --proxy=http://localhost:8080 # Search for Tomcat creds and export results to /tmp/tomcat-usernames.txt , /tmp/tomcat-passwords.txt ➤ creds search tomcat --proxy=http://localhost:8080 export ``` > **Proxy option** is only available from version 0.5.2 [![asciicast](https://asciinema.org/a/526599.svg)](https://asciinema.org/a/526599) #### Pass Station [noraj][noraj] created CLI & library to search for default credentials among this database using `DefaultCreds-Cheat-Sheet.csv`. The tool is named [Pass Station][pass-station] ([Doc][ps-doc]) and has some powerful search feature (fields, switches, regexp, highlight) and output (simple table, pretty table, JSON, YAML, CSV). [![asciicast](https://asciinema.org/a/397713.svg)](https://asciinema.org/a/397713) [noraj]:https://pwn.by/noraj/ [pass-station]:https://github.com/sec-it/pass-station [ps-doc]:https://sec-it.github.io/pass-station/ ## Contribute If you cannot find the password for a specific product, please submit a pull request to update the dataset.<br> > ### Disclaimer > **For educational purposes only, use it at your own responsibility.** ", Assign "at most 3 tags" to the expected json: {"id":"3480","tags":[]} "only from the tags list I provide: []" returns me the "expected json"