shodan query for find Default or generic credentials

Currently reading:
 shodan query for find Default or generic credentials

saeidsh

Member
LV
0
Joined
Jun 15, 2024
Threads
9
Likes
0
Awards
1
Credits
320©
Cash
0$
  1. admin 1234 – basic very unsecure credentials.
  2. “default password” – speaks for itself…
  3. test test port:”80″ – generic test credentials over HTTP.
  4. “authentication disabled” “RFB 003.008” – no authentication necessary.
  5. root@” port:23 -login -password -name -Session – accounts already logged in with root privilege over Telnet, port 23.
  6. port:23 console gateway – remote access via Telnet, no password required.
  7. html:”def_wirelesspassword” – default login pages for routers.
  8. “polycom command shell” – possible authentication bypass to Polycom devices.
  9. “authentication disabled” port:5900,5901 – VNC services without authentication.
  10. “server: Bomgar” “200 OK” – Bomgar remote support service.
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Tips
Top Bottom