Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/documentation/modules/auxiliary/scanner/scada/bacnet_l3.md
Views: 11789
Vulnerable Application
BACnet is a Data Communication Protocol for Building Automation and Control Networks. Developed under the auspices of the American Society of Heating, Refrigerating and Air-Conditioning Engineers (ASHRAE), BACnet is an American national standard, a European standard, a national standard in more than 30 countries, and an ISO global standard. The protocol is supported and maintained by ASHRAE Standing Standard Project Committee 135
This script polls bacnet devices with a l3 broadcast Who-is message and for each reply communicates further to discover more data and saves the data into metasploit. Each bacnet device responds with this data:
It's IP address, and BACnet/IP address (if the device is nested).
It's device number.
Model name.
Application software version.
Firmware revision.
Device description.
Verification Steps
Start msfconsole.
Do:
use auxiliary/scanner/scada/bacnet_l3
.Do:
set INTERFACE
.Do:
run
.Devices running the BACnet protocol should respond with data.
Options
A user can choose between the interfaces of his host (e.g. eth1, ens192...), the number of Who-is packets to send - for reliability purposes, the time (in seconds) to wait for packets to arrive and the UDP port, the default is 47808.
The user can always check these options via the show options
command.
Scenarios
The following demonstrates a basic scenario, we "detect" two devices: