Skip to content

gurza/Tridium-Niagara-Password-Cracker

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 

Repository files navigation

Tridium Niagara Password Cracker

By VenomInfoSec

Purpose

An online password cracker that brute forces passwords for the Tridium Niagara platform.

  • Hydra didn't work with the target due to multiple redirects, custom encoding scheme, and CSRF tokens.
  • Currently only supports HTTP but the testCreds() method can be modified to support HTTPS since it just uses the requests module

Help

C:\>python NiagaraPswd.py -h
usage: NiagaraPswd.py [-h] -l LIST -u USERNAME -f FAILURE [-r] target

Brute force Tridium Niagara AX Web Login

positional arguments:
  target                The IP or root URL of the Tridium Niagara AX Webpage

optional arguments:
  -h, --help            show this help message and exit
  -l LIST, --list LIST  The path of the wordlist to be used
  -u USERNAME, --username USERNAME
                        The username to try
  -f FAILURE, --failure FAILURE
                        The path of the webpage that illustrates what a failed
                        login attempt is
  -r, --resume          If the last attempt resulted in unexpected program
                        failure, use this option to resume from the last
                        credentail tried

Example

C:\>python NiagaraPswd.py -l phpbb-rules.txt -u admin -f default.html 127.0.0.1
 [*] Initializing wordlist...

 [-] admin:YeBs2wu992 is incorrect
 [-] admin:avKNwJ2938 is incorrect
 [-] admin:dAGwAKn976 is incorrect
 [-] admin:XeesHfy623 is incorrect
 [-] admin:S8Ydn4l735 is incorrect
 [!] Keyboard Interrupt, saving last tried creds

TODO

  • Add support for HTTPS
  • Add support for threading

About

An online password cracker that brute forces passwords for the Tridium Niagara platform

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages