One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password π‘οΈ
MIT License
One place for all the default credentials to assist pentesters during an engagement, this document has several products default login/password gathered from multiple sources.
P.S : Most of the credentials were extracted from changeme,routersploit and Seclists projects, you can use these tools to automate the process https://github.com/ztgrace/changeme , https://github.com/threat9/routersploit (kudos for the awesome work)
Product/Vendor | Username | Password | |
---|---|---|---|
count | 3668 | 3668 | 3668 |
unique | 1347 | 1110 | 1658 |
top | Oracle | ||
freq | 235 | 790 | 474 |
The Default Credentials Cheat Sheet tool is available on pypi
$ pip3 install defaultcreds-cheat-sheet
$ creds search tomcat
Operating System | Tested |
---|---|
Linux(Kali,Ubuntu,Lubuntu) | βοΈ |
Windows(10,11) | βοΈ |
macOS | β |
$ git clone https://github.com/ihebski/DefaultCreds-cheat-sheet
$ pip3 install -r requirements.txt
$ cp creds /usr/bin/ && chmod +x /usr/bin/creds
$ creds search tomcat
# Search for product creds
β€ creds search tomcat
+----------------------------------+------------+------------+
| Product | username | password |
+----------------------------------+------------+------------+
| apache tomcat (web) | tomcat | tomcat |
| apache tomcat (web) | admin | admin |
...
+----------------------------------+------------+------------+
# Update records
β€ creds update
Check for new updates...π
New updates are available π§
[+] Download database...
# Export Creds to files (could be used for brute force attacks)
β€ creds search tomcat export
+----------------------------------+------------+------------+
| Product | username | password |
+----------------------------------+------------+------------+
| apache tomcat (web) | tomcat | tomcat |
| apache tomcat (web) | admin | admin |
...
+----------------------------------+------------+------------+
[+] Creds saved to /tmp/tomcat-usernames.txt , /tmp/tomcat-passwords.txt π₯
Run creds through proxy
# Search for product creds
β€ creds search tomcat --proxy=http://localhost:8080
# update records
β€ creds update --proxy=http://localhost:8080
# Search for Tomcat creds and export results to /tmp/tomcat-usernames.txt , /tmp/tomcat-passwords.txt
β€ creds search tomcat --proxy=http://localhost:8080 export
Proxy option is only available from version 0.5.2
noraj created CLI & library to search for default credentials among this database using DefaultCreds-Cheat-Sheet.csv
.
The tool is named Pass Station (Doc) and has some powerful search feature (fields, switches, regexp, highlight) and output (simple table, pretty table, JSON, YAML, CSV).
If you cannot find the password for a specific product, please submit a pull request to update the dataset.
Disclaimer
For educational purposes only, use it at your own responsibility.