IPMI Pentesting Notes
Protocol Overview
Basic Information
Port: UDP 623
Protocol Type: Hardware management protocol
Purpose: Remote server management and monitoring
Security: Various authentication methods, often poorly configured
Key Components
BMC (Baseboard Management Controller)
Embedded Linux system
Independent of host OS
Manages hardware directly
Common Implementations
HP iLO (Integrated Lights Out)
Dell iDRAC
Supermicro IPMI
IBM IMM
Initial Enumeration
Port Scanning
Version Detection
Default Credentials
Common Defaults
Dell iDRAC
root
calvin
HP iLO
Administrator
<8-char random>
Supermicro
ADMIN
ADMIN
IBM IMM
USERID
PASSW0RD
Testing Default Access
Password Attacks
Hash Dumping
Cracking Hashes
Common NSE Scripts
Exploitation Techniques
Cipher Zero Authentication
RAKP Authentication Bypass
Post Exploitation
Information Gathering
System Control
Common Vulnerabilities
Authentication Issues:
Default credentials
Cipher Zero authentication
RAKP authentication bypass
Weak password policies
Configuration Problems:
Exposed IPMI interfaces
Outdated firmware
Missing patches
Weak network restrictions
Known CVEs:
CVE-2013-4786 (Cipher Zero)
CVE-2013-4787 (IPMI 2.0 RAKP Authentication)
Multiple HP iLO vulnerabilities
Response Codes and Messages
0x00
Success
0xC0
Node Busy
0xC1
Invalid Command
0xC3
Timeout
0xC4
Out of Space
0xC5
Invalid Data
0xFF
Unspecified Error
Best Practices for Pentesting
Initial Reconnaissance:
Port discovery
Version detection
Default credential testing
Cipher support checking
Deep Enumeration:
User enumeration
Hash dumping
Vulnerability scanning
Configuration analysis
Documentation:
Version information
Found credentials
Vulnerable configurations
Successful exploits
Risk Assessment:
Physical access implications
Network exposure
Credential security
Patch status
Common Tools Summary
Enumeration:
nmap
ipmitool
Metasploit modules
Custom Python scripts
Exploitation:
Metasploit
hashcat
John the Ripper
ipmitool
Post-Exploitation:
ipmitool
IPMI management interfaces
Custom scripts
Web interfaces