eyeIPMI Pentesting Notes

Protocol Overview

Basic Information

  • Port: UDP 623

  • Protocol Type: Hardware management protocol

  • Purpose: Remote server management and monitoring

  • Security: Various authentication methods, often poorly configured

Key Components

  1. BMC (Baseboard Management Controller)

    • Embedded Linux system

    • Independent of host OS

    • Manages hardware directly

  2. Common Implementations

    • HP iLO (Integrated Lights Out)

    • Dell iDRAC

    • Supermicro IPMI

    • IBM IMM

Initial Enumeration

Port Scanning

Version Detection

Default Credentials

Common Defaults

Vendor
Username
Password

Dell iDRAC

root

calvin

HP iLO

Administrator

<8-char random>

Supermicro

ADMIN

ADMIN

IBM IMM

USERID

PASSW0RD

Testing Default Access

Password Attacks

Hash Dumping

Cracking Hashes

Common NSE Scripts

Exploitation Techniques

Cipher Zero Authentication

RAKP Authentication Bypass

Post Exploitation

Information Gathering

System Control

Common Vulnerabilities

  1. Authentication Issues:

    • Default credentials

    • Cipher Zero authentication

    • RAKP authentication bypass

    • Weak password policies

  2. Configuration Problems:

    • Exposed IPMI interfaces

    • Outdated firmware

    • Missing patches

    • Weak network restrictions

  3. Known CVEs:

    • CVE-2013-4786 (Cipher Zero)

    • CVE-2013-4787 (IPMI 2.0 RAKP Authentication)

    • Multiple HP iLO vulnerabilities

Response Codes and Messages

Code
Meaning

0x00

Success

0xC0

Node Busy

0xC1

Invalid Command

0xC3

Timeout

0xC4

Out of Space

0xC5

Invalid Data

0xFF

Unspecified Error

Best Practices for Pentesting

  1. Initial Reconnaissance:

    • Port discovery

    • Version detection

    • Default credential testing

    • Cipher support checking

  2. Deep Enumeration:

    • User enumeration

    • Hash dumping

    • Vulnerability scanning

    • Configuration analysis

  3. Documentation:

    • Version information

    • Found credentials

    • Vulnerable configurations

    • Successful exploits

  4. Risk Assessment:

    • Physical access implications

    • Network exposure

    • Credential security

    • Patch status

Common Tools Summary

  1. Enumeration:

    • nmap

    • ipmitool

    • Metasploit modules

    • Custom Python scripts

  2. Exploitation:

    • Metasploit

    • hashcat

    • John the Ripper

    • ipmitool

  3. Post-Exploitation:

    • ipmitool

    • IPMI management interfaces

    • Custom scripts

    • Web interfaces