IPMI Enumeration
Overview
IPMI (Intelligent Platform Management Interface) is a set of standardized specifications for hardware-based host management systems used for system management and monitoring. IPMI can be used to manage a server or network device before the OS is installed, during OS runtime, or even when the system is powered off.
Key Characteristics:
Port 623: IPMI over UDP
Purpose: Remote system management, monitoring, and control
Independence: Functions independently of the main OS
Access: Direct hardware-level access to systems
Authentication: Username/password based with various privilege levels
IPMI Components
BMC (Baseboard Management Controller)
Function: Microprocessor that monitors the server
Independence: Operates independently of the main CPU and OS
Power: Continuously powered (even when server is off)
Access: Provides hardware access to system components
Communication: Interfaces with various system sensors and components
Management Console
Purpose: Interface for administrators to interact with IPMI
Access Methods: Web interface, command-line tools, SNMP
Functionality: System monitoring, power management, configuration
Remote Access: Allows remote management of systems
IPMI Protocol Stack
Application Layer
Commands and responses
Session Layer
Authentication and session management
Message Layer
Message formatting and routing
Transport Layer
UDP/TCP communication
IPMI Versions and Authentication
IPMI Version Comparison
IPMI 1.5
MD5 hash
None
Basic authentication, no encryption
IPMI 2.0
HMAC-based
AES encryption
Enhanced authentication, encrypted sessions
Authentication Types
None: No authentication required
MD2: MD2 hash-based authentication
MD5: MD5 hash-based authentication
Straight Password: Plain text password
OEM: Vendor-specific authentication
IPMI Privilege Levels
Callback
Lowest privilege
Basic system information
User
Standard user
System monitoring, some control
Operator
Operator level
Power management, system control
Administrator
Highest privilege
Full system control, configuration
OEM
Vendor-specific
Custom vendor functions
Default Configuration Issues
Common Misconfigurations
Default Credentials: Many systems ship with default usernames/passwords
Weak Passwords: Simple or commonly known passwords
Network Exposure: IPMI accessible from external networks
No Authentication: Anonymous access enabled
Version Vulnerabilities: Using vulnerable IPMI versions
Common Default Credentials
Dangerous Settings
Anonymous Access
No authentication required
Critical
Default Passwords
Factory default credentials
High
Network Accessible
IPMI accessible from WAN
High
IPMI 1.5
Vulnerable version with weak authentication
Medium
Null Username
Empty username accepted
High
Enumeration Techniques
1. Service Detection
2. IPMI Version Detection
3. Authentication Testing
4. Default Credential Testing
Advanced Enumeration
Using ipmitool
Using Metasploit
Hash Extraction and Cracking
Vulnerability Assessment
IPMI 2.0 RAKP Authentication Bypass
Common IPMI Vulnerabilities
CVE-2013-4786: IPMI 2.0 RAKP authentication bypass
Default Credentials: Factory default passwords
Weak Authentication: Insufficient authentication mechanisms
Network Exposure: IPMI accessible from untrusted networks
Practical Examples
HTB Academy Style Enumeration
HTB Academy Lab Questions Examples
Real-World Scenario
Information Gathering
System Information
User Management
Attack Vectors
1. Password Hash Extraction
2. Default Credential Access
3. Power Management Attacks
Enumeration Checklist
Initial Discovery
Vulnerability Assessment
Information Gathering
Security Testing
Tools and Techniques
Essential IPMI Tools
Tool Installation
Custom Scripts
Defensive Measures
Secure IPMI Configuration
Best Practices
Change Default Passwords: Use strong, unique passwords
Network Segmentation: Isolate IPMI on management network
Regular Updates: Keep BMC firmware updated
Access Control: Limit IPMI access to authorized users
Monitoring: Log and monitor IPMI access attempts
Detection and Monitoring
Common Vulnerabilities
IPMI 2.0 RAKP Authentication Bypass
CVE: CVE-2013-4786
Impact: Password hash extraction
Mitigation: Disable cipher zero, use strong passwords
Default Credentials
Issue: Factory default passwords
Impact: Unauthorized system access
Mitigation: Change all default passwords
Network Exposure
Issue: IPMI accessible from untrusted networks
Impact: Remote unauthorized access
Mitigation: Network segmentation, firewall rules
Hash Cracking Techniques
Hashcat IPMI Mode
John the Ripper
Post-Exploitation
System Control
Persistence
Remediation
Immediate Actions
Change all default passwords
Disable unnecessary user accounts
Update BMC firmware
Configure network restrictions
Enable logging and monitoring
Long-term Security
Regular password rotation
Network segmentation
Vulnerability scanning
Access control reviews
Incident response procedures
Last updated