IPMI Enumeration

Overview

IPMI (Intelligent Platform Management Interface) is a set of standardized specifications for hardware-based host management systems used for system management and monitoring. IPMI can be used to manage a server or network device before the OS is installed, during OS runtime, or even when the system is powered off.

Key Characteristics:

  • Port 623: IPMI over UDP

  • Purpose: Remote system management, monitoring, and control

  • Independence: Functions independently of the main OS

  • Access: Direct hardware-level access to systems

  • Authentication: Username/password based with various privilege levels

IPMI Components

BMC (Baseboard Management Controller)

  • Function: Microprocessor that monitors the server

  • Independence: Operates independently of the main CPU and OS

  • Power: Continuously powered (even when server is off)

  • Access: Provides hardware access to system components

  • Communication: Interfaces with various system sensors and components

Management Console

  • Purpose: Interface for administrators to interact with IPMI

  • Access Methods: Web interface, command-line tools, SNMP

  • Functionality: System monitoring, power management, configuration

  • Remote Access: Allows remote management of systems

IPMI Protocol Stack

Layer
Description

Application Layer

Commands and responses

Session Layer

Authentication and session management

Message Layer

Message formatting and routing

Transport Layer

UDP/TCP communication

IPMI Versions and Authentication

IPMI Version Comparison

Version
Authentication
Encryption
Security Features

IPMI 1.5

MD5 hash

None

Basic authentication, no encryption

IPMI 2.0

HMAC-based

AES encryption

Enhanced authentication, encrypted sessions

Authentication Types

  • None: No authentication required

  • MD2: MD2 hash-based authentication

  • MD5: MD5 hash-based authentication

  • Straight Password: Plain text password

  • OEM: Vendor-specific authentication

IPMI Privilege Levels

Level
Description
Capabilities

Callback

Lowest privilege

Basic system information

User

Standard user

System monitoring, some control

Operator

Operator level

Power management, system control

Administrator

Highest privilege

Full system control, configuration

OEM

Vendor-specific

Custom vendor functions

Default Configuration Issues

Common Misconfigurations

  1. Default Credentials: Many systems ship with default usernames/passwords

  2. Weak Passwords: Simple or commonly known passwords

  3. Network Exposure: IPMI accessible from external networks

  4. No Authentication: Anonymous access enabled

  5. Version Vulnerabilities: Using vulnerable IPMI versions

Common Default Credentials

Dangerous Settings

Setting
Description
Risk Level

Anonymous Access

No authentication required

Critical

Default Passwords

Factory default credentials

High

Network Accessible

IPMI accessible from WAN

High

IPMI 1.5

Vulnerable version with weak authentication

Medium

Null Username

Empty username accepted

High

Enumeration Techniques

1. Service Detection

2. IPMI Version Detection

3. Authentication Testing

4. Default Credential Testing

Advanced Enumeration

Using ipmitool

Using Metasploit

Hash Extraction and Cracking

Vulnerability Assessment

IPMI 2.0 RAKP Authentication Bypass

Common IPMI Vulnerabilities

  1. CVE-2013-4786: IPMI 2.0 RAKP authentication bypass

  2. Default Credentials: Factory default passwords

  3. Weak Authentication: Insufficient authentication mechanisms

  4. Network Exposure: IPMI accessible from untrusted networks

Practical Examples

HTB Academy Style Enumeration

HTB Academy Lab Questions Examples

Real-World Scenario

Information Gathering

System Information

User Management

Attack Vectors

1. Password Hash Extraction

2. Default Credential Access

3. Power Management Attacks

Enumeration Checklist

Initial Discovery

Vulnerability Assessment

Information Gathering

Security Testing

Tools and Techniques

Essential IPMI Tools

Tool Installation

Custom Scripts

Defensive Measures

Secure IPMI Configuration

Best Practices

  1. Change Default Passwords: Use strong, unique passwords

  2. Network Segmentation: Isolate IPMI on management network

  3. Regular Updates: Keep BMC firmware updated

  4. Access Control: Limit IPMI access to authorized users

  5. Monitoring: Log and monitor IPMI access attempts

Detection and Monitoring

Common Vulnerabilities

IPMI 2.0 RAKP Authentication Bypass

  • CVE: CVE-2013-4786

  • Impact: Password hash extraction

  • Mitigation: Disable cipher zero, use strong passwords

Default Credentials

  • Issue: Factory default passwords

  • Impact: Unauthorized system access

  • Mitigation: Change all default passwords

Network Exposure

  • Issue: IPMI accessible from untrusted networks

  • Impact: Remote unauthorized access

  • Mitigation: Network segmentation, firewall rules

Hash Cracking Techniques

Hashcat IPMI Mode

John the Ripper

Post-Exploitation

System Control

Persistence

Remediation

Immediate Actions

  1. Change all default passwords

  2. Disable unnecessary user accounts

  3. Update BMC firmware

  4. Configure network restrictions

  5. Enable logging and monitoring

Long-term Security

  1. Regular password rotation

  2. Network segmentation

  3. Vulnerability scanning

  4. Access control reviews

  5. Incident response procedures

Last updated