15672 - Pentesting RabbitMQ Management
Last updated
Last updated
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
Bug bounty tip: jiandikishe kwa Intigriti, jukwaa la bug bounty la hali ya juu lililotengenezwa na hackers, kwa hackers! Jiunge nasi kwenye https://go.intigriti.com/hacktricks leo, na anza kupata zawadi hadi $100,000!
You can learn more about RabbitMQ in 5671,5672 - Pentesting AMQP. In this port you may find the RabbitMQ Management web console if the management plugin is enabled. The main page should looks like this:
The default credentials are "guest":"guest". If they aren't working you may try to brute-force the login.
To manually start this module you need to execute:
Mara tu umepata uthibitisho sahihi utaona konsoli ya admin:
Pia, ikiwa una akreditivu halali unaweza kupata habari ya kuvutia katika http://localhost:15672/api/connections
Kumbuka pia kwamba inawezekana kuchapisha data ndani ya foleni kwa kutumia API ya huduma hii kwa ombi kama:
port:15672 http
Bug bounty tip: jiandikishe kwa Intigriti, jukwaa la bug bounty la hali ya juu lililotengenezwa na hackers, kwa hackers! Jiunge nasi kwenye https://go.intigriti.com/hacktricks leo, na uanze kupata zawadi hadi $100,000!
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)