[Information Exploit]
[+] Exploit Title: Reanod Default Admin Password Vulnerability
[+] Author : TrazeR & AKINCILAR
[+] Vendor Home: http://www.reanod.com/
[+] Dork : intext:"Powered by reanod"
[+] Tested on : BackBox 5.1, Chrome
[Site Target]
- http://www.ynfmachineryparts.com/admin/
- http://www.queenta-precision.com/admin
- http://www.ricemachinechina.com/admin
[Poc Default Admin]
[+] Dorking İn Google Or Other Search Enggine
[+] Manager-Url: /admin
[+] UserName: Reanod68 OR ===> admin
[+] Password: reanod6688
[+] Poc local Admin : /admin
http://www.queenta-precision.com/admin
Enter username and password
UserName: Reanod68 OR ===> admin
Password: reanod6688
if you still don't understand please refer to this video
Sumber : [cxsecurity.com]
0 Comments