When a new Dell chassis hardware infrastructure is installed, a Web interface is also present to help with management of the chassis. each blade has its own web interface that gets installed by default on 443 (https ). during a penetration test, the dell
Drac installations (Web Interface) can lead to an entire compromise of the overall infrastructure and ultimately own everything else. when the Drac interface is installed, it installwith default credentials of username "root" and password of "Calvin ". today,
We are releasing a new tools called the Dell Drac and chassis available for default credentials v0.1a which will scan CIDR notations look for default installations. it's extremely quick in that it scans/24's in less than a minute and class B's in about an hour.
This will give you the results of all of the default installations of the Dell Drac and Dell chassis management interfaces. Below is an example of the output:
Daves-MacBook-Pro-2: desktop David $ Python delldrac. py
++ ++
Dell Drac and chassis plugin for default credentials v0.1a
Written by Dave Kennedy @ trustedsec
Https://www.trustedsec.com
@ Trustedsec and @ dave_rel1k
++ ++
Example: Python delldrac. py 10.1.1.1/24
Python delldrac. py
Daves-MacBook-Pro-2: desktop David $ Python delldrac. py 10.1.1.1/16
[*] Scanning IP addresses, this cocould take a few minutes depending on how large the subnet range...
[*] Dell chassis compromised! Username: Root Password: Calvin for IP Address: 10.1.1.5
[*] Drac compromised! Username: Root and password: Calvin for IP Address: 10.1.1.9
[*] Drac compromised! Username: Root and password: Calvin for IP Address: 10.1.1.18
Daves-MacBook-Pro-2: desktop David $
Once you have an idea of what IP addresses have the default installations, browse via SSL to the installation below:
Using the default credentials of username "root" and password of "Calvin", you can successfully log into the main management interface:
Once inside, there is a lot of options available to you such as rebooting the server, server health, and most importantly the virtual media/console. inside the virtual media/console options, you have the ability to mount remote virtual media. since you are
Interfacing directly with the hardware, you can enable the virtual media, have it automatically attach, then reboot the server on the other end into an ISO of your choosing. when we did this penetration test, we rebooted the Windows Server 2008 R2 instance
Into our favorite back | track 5 ISO and mounted the NTFS drive with read write. once inside there, made a backup of utilman.exe (located in system32) and copied cmd.exe to utilman.exe. when we rebooted into the server, hitting the Windows key + u triggers utilman
(Utilman.exe) and pops up a command prompt with SYSTEM level privileges. Below is a step by step:
1. log into the Dell Drac instance.
2. From the main console, select the virtual console/media tab and select "configuration>
3. Select the console plug-in type for IE to Java instead of Active X (seemed Buggy for me ).
4. On the virtual Media Section in the Same tab, select "auto attach ".
5. Select the virtual console and virtual media tab and launch the Java Applet console for the virtual media interface.
6. Once inside, mount the virtual media device and select your ISO from your local filesystem.
7. Under the "power" tab, reboot the server. Select F11 during the initial boot sequence to force a selection of boot options, or edit the BIOS to ensure virtual media is selected first.
8. Wait for the boot sequence and select virtual media adapter.
9. Reboot into back | track Linux, this will take a few minutes since you are booting an ISO over the network.
10. Once inside, mount the NTFS share as read/write:
Mkdir/mnt/Windows
Mount-T ntfs-3g/dev/sda1/mnt/win
11. Once mounted, go to % Windir % \ system32 and do the following:
Cd % Windir % \ system32
MV utilman.exe. Bak
CP cmd.exe utilman.exe
Umount/mnt/win
12. reboot the machine and when the server 2008 window appears, hit the Windows key + U. from there you will get a command prompt running as system. type assumer.exe To Get A Start Menu. after that, dump hashes, add a local Admin, pillage, steal Kerberos
Tokens, etc. etc. note in this step you can also use sethc.exe and make a backup of that and copy cmd.exe as sethc.exe. when rebooted you hit the Shift key 5 times (Sticky Keys) and will have a system command prompt as well.
You can download the tool here:
Dell Drac and chassis plugin for default credentials v0.1a download