CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutSign UpSign In
rapid7

Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.

GitHub Repository: rapid7/metasploit-framework
Path: blob/master/documentation/modules/auxiliary/scanner/misc/ibm_mq_enum.md
Views: 11787

Vulnerable Application

Verification Steps

  1. Install IBM MQ Server 7.5, 8, or 9

  2. Start msfconsole

  3. Do: use auxiliary/scanner/misc/ibm_mq_enum

  4. Do: set channel <channel_name>

  5. Do: set rhosts <target_IP>

  6. Do: set rport <port>

  7. Do: run

Options

CHANNEL

This option should contain the name of a valid MQ channel. This can be obtained using the module auxiliary/scanner/misc/ibm_mq_channel_brute

Scenarios

This module can be used to obtain the Queue Manager name as well as the version of the MQ being used on the target host. When the Queue Manager name and a valid MQI channel name without SSL is known , the module auxiliary/scanner/misc/ibm_mq_login can be used to identify usernames that can authenticate to the Queue Manager.

msf auxiliary(scanner/misc/ibm_mq_enum) > run [+] 10.1.1.144: - 10.1.1.144:1414 - Queue Manager Name: TESTQM - MQ Version: 9.1.0.0 [*] Scanned 1 of 1 hosts (100% complete) [*] Auxiliary module execution completed