IPMI Pentesting Notes
Protocol Overview
Basic Information
Key Components
Initial Enumeration
Port Scanning
Version Detection
Default Credentials
Common Defaults
Vendor
Username
Password
Testing Default Access
Password Attacks
Hash Dumping
Cracking Hashes
Common NSE Scripts
Exploitation Techniques
Cipher Zero Authentication
RAKP Authentication Bypass
Post Exploitation
Information Gathering
System Control
Common Vulnerabilities
Response Codes and Messages
Code
Meaning