IncidentResponsev2

Scan Device for Default Admin Password

Task Scan Device For Default Admin Passwords

Conditions

Given a suspected compromised network segment(s), access to a system that can access and scan the identified network devices, and scanning software included in the team’s incident response kit.

Operator Note: Default or weak admin credentials are a common foothold used by attackers. Identify and report them immediately.

Standards

Operator Note: Always coordinate with network owner prior to scanning production systems.

End State

All devices on network with weak or default passwords will be identified.

Operator Note: Results should be documented, validated with system owners, and used to plan remediation actions.

Manual Steps

Using Nessus (Web UI)

  1. Log into Nessus via IP and port 8834.

Example:

https://x.x.x.x:8834
  1. Verify correct plugins are enabled:

Operator Note: Some plugins may be disabled by default for safety. Review plugin descriptions carefully.

  1. Create a new Advanced Scan:
  1. Monitor and review results once completed.

Operator Note: Findings may include embedded device logins, network appliances, and misconfigured admin interfaces.

Running Script

Dependencies

Nessus installation quick guide:

Ubuntu/Debian:

dpkg -i Nessus-latest-debian6_amd64.deb
sudo /bin/systemctl start nessusd.service

Access GUI:

https://localhost:8834

Operator Note: Install Nessus on isolated assessment VM or approved incident response host.

Other available tools

nmap --script=default-credentials -p 22,23,80,443 x.x.x.x/24
hydra -L users.txt -P passwords.txt 192.168.1.1 ssh

Operator Note: Nmap can identify default credentials passively, Hydra is active/password guessing and should only be used with explicit authorization.

References

Nessus Plugins
Nessus Default Credentials
Nmap NSE Default Credentials


Operator Recommendations and Additional Tools

Operator Checklist

Tools by Platform

Platform Tool Purpose
Universal Nessus Primary tool for known/default password scans
Linux/Windows Nmap NSE scripts Optional passive scan for embedded device defaults
Linux/Windows Hydra Advanced password brute-forcing (authorized use only)

Alternate Commands and Examples

Nmap Default Credentials (quick test):

nmap --script=default-credentials -p 22,23,80,443 192.168.1.0/24

Hydra (authorized use only):

hydra -L users.txt -P passwords.txt 192.168.1.50 ssh

Best Practices


Revision History

Date Version Description Author
2025-05-02 1.8 Full original + enriched Nessus + alternative tooling + operator recommendations Leo