IPMI

  • IPMI you would be able to execute remote commands

  • Intelligent Platform Management Interface

  • works independently from the host os

    • can work when the system is shutdown

    • Before the OS has booted to modify BIOS settings

    • When the host is fully powered down

    • Access to a host after a system failure

  • IPMI requires the following components:

    • Baseboard Management Controller (BMC) - A micro-controller and essential component of an IPMI

    • Intelligent Chassis Management Bus (ICMB) - An interface that permits communication from one chassis to another

    • Intelligent Platform Management Bus (IPMB) - extends the BMC

    • IPMI Memory - stores things such as the system event log, repository store data, and more

    • Communications Interfaces - local system interfaces, serial and LAN interfaces, ICMB and PCI Management Bus

  • Some unique default passwords to keep in our cheatsheets include:

Product
Username
Password

Dell iDRAC

root

calvin

HP iLO

Administrator

randomized 8-character string consisting of numbers and uppercase letters

Supermicro IPMI

ADMIN

ADMIN

Footprinting the Service

Nmap

Metasploit Version Scan

Metasploit Dumping Hashes

for above command

  • can set PASS_FILE

Dangerous Settings

  • If default credentials do not work to access a BMC, we can turn to a flaw in the RAKP protocol in IPMI 2.0.

    • During the authentication process, the server sends a salted SHA1 or MD5 hash of the user's password to the client before authentication takes place.

    • can be leveraged to obtain the password hash for ANY valid user account on the BMC.

      • can be cracked offline

        • hashcat -m 7300 ipmi.txt -a 3 ?1?1?1?1?1?1?1?1 -1 ?d?u

Last updated