mirror of
https://github.com/carlospolop/hacktricks
synced 2024-12-20 01:55:46 +00:00
164 lines
7.1 KiB
Markdown
164 lines
7.1 KiB
Markdown
|
# 27017,27018 - Pentesting MongoDB
|
|||
|
|
|||
|
{% hint style="success" %}
|
|||
|
Learn & practice AWS Hacking:<img src="../.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="../.gitbook/assets/arte.png" alt="" data-size="line">\
|
|||
|
Learn & practice GCP Hacking: <img src="../.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks Training GCP Red Team Expert (GRTE)**<img src="../.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
|
|||
|
|
|||
|
<details>
|
|||
|
|
|||
|
<summary>Support HackTricks</summary>
|
|||
|
|
|||
|
* Check the [**subscription plans**](https://github.com/sponsors/carlospolop)!
|
|||
|
* **Join the** 💬 [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** us on **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks_live)**.**
|
|||
|
* **Share hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
|
|||
|
|
|||
|
</details>
|
|||
|
{% endhint %}
|
|||
|
|
|||
|
<figure><img src="../.gitbook/assets/image (3).png" alt=""><figcaption></figcaption></figure>
|
|||
|
|
|||
|
Join [**HackenProof Discord**](https://discord.com/invite/N3FrSbmwdy) server to communicate with experienced hackers and bug bounty hunters!
|
|||
|
|
|||
|
**Hacking Insights**\
|
|||
|
Engage with content that delves into the thrill and challenges of hacking
|
|||
|
|
|||
|
**Real-Time Hack News**\
|
|||
|
Keep up-to-date with fast-paced hacking world through real-time news and insights
|
|||
|
|
|||
|
**Latest Announcements**\
|
|||
|
Stay informed with the newest bug bounties launching and crucial platform updates
|
|||
|
|
|||
|
**Join us on** [**Discord**](https://discord.com/invite/N3FrSbmwdy) and start collaborating with top hackers today!
|
|||
|
|
|||
|
## Basic Information
|
|||
|
|
|||
|
**MongoDB** is an **open source** database management system that uses a **document-oriented database model** to handle diverse forms of data. It offers flexibility and scalability for managing unstructured or semi-structured data in applications like big data analytics and content management. **Default port:** 27017, 27018
|
|||
|
|
|||
|
```
|
|||
|
PORT STATE SERVICE VERSION
|
|||
|
27017/tcp open mongodb MongoDB 2.6.9 2.6.9
|
|||
|
```
|
|||
|
|
|||
|
## Enumeration
|
|||
|
|
|||
|
### Manual
|
|||
|
|
|||
|
```python
|
|||
|
from pymongo import MongoClient
|
|||
|
client = MongoClient(host, port, username=username, password=password)
|
|||
|
client.server_info() #Basic info
|
|||
|
#If you have admin access you can obtain more info
|
|||
|
admin = client.admin
|
|||
|
admin_info = admin.command("serverStatus")
|
|||
|
cursor = client.list_databases()
|
|||
|
for db in cursor:
|
|||
|
print(db)
|
|||
|
print(client[db["name"]].list_collection_names())
|
|||
|
#If admin access, you could dump the database also
|
|||
|
```
|
|||
|
|
|||
|
**Some MongoDB commnads:**
|
|||
|
|
|||
|
```bash
|
|||
|
show dbs
|
|||
|
use <db>
|
|||
|
show collections
|
|||
|
db.<collection>.find() #Dump the collection
|
|||
|
db.<collection>.count() #Number of records of the collection
|
|||
|
db.current.find({"username":"admin"}) #Find in current db the username admin
|
|||
|
```
|
|||
|
|
|||
|
### Automatic
|
|||
|
|
|||
|
```bash
|
|||
|
nmap -sV --script "mongo* and default" -p 27017 <IP> #By default all the nmap mongo enumerate scripts are used
|
|||
|
```
|
|||
|
|
|||
|
### Shodan
|
|||
|
|
|||
|
* All mongodb: `"mongodb server information"`
|
|||
|
* Search for full open mongodb servers: `"mongodb server information" -"partially enabled"`
|
|||
|
* Only partially enable auth: `"mongodb server information" "partially enabled"`
|
|||
|
|
|||
|
## Login
|
|||
|
|
|||
|
By default mongo does not require password.\
|
|||
|
**Admin** is a common mongo database.
|
|||
|
|
|||
|
```bash
|
|||
|
mongo <HOST>
|
|||
|
mongo <HOST>:<PORT>
|
|||
|
mongo <HOST>:<PORT>/<DB>
|
|||
|
mongo <database> -u <username> -p '<password>'
|
|||
|
```
|
|||
|
|
|||
|
The nmap script: _**mongodb-brute**_ will check if creds are needed.
|
|||
|
|
|||
|
```bash
|
|||
|
nmap -n -sV --script mongodb-brute -p 27017 <ip>
|
|||
|
```
|
|||
|
|
|||
|
### [**Brute force**](../generic-methodologies-and-resources/brute-force.md#mongo)
|
|||
|
|
|||
|
Look inside _/opt/bitnami/mongodb/mongodb.conf_ to know if credentials are needed:
|
|||
|
|
|||
|
```bash
|
|||
|
grep "noauth.*true" /opt/bitnami/mongodb/mongodb.conf | grep -v "^#" #Not needed
|
|||
|
grep "auth.*true" /opt/bitnami/mongodb/mongodb.conf | grep -v "^#\|noauth" #Not needed
|
|||
|
```
|
|||
|
|
|||
|
## Mongo Objectid Predict
|
|||
|
|
|||
|
Example [from here](https://techkranti.com/idor-through-mongodb-object-ids-prediction/).
|
|||
|
|
|||
|
Mongo Object IDs are **12-byte hexadecimal** strings:
|
|||
|
|
|||
|
![http://techidiocy.com/\_id-objectid-in-mongodb/](../.gitbook/assets/id-and-ObjectIds-in-MongoDB.png)
|
|||
|
|
|||
|
For example, here’s how we can dissect an actual Object ID returned by an application: 5f2459ac9fa6dc2500314019
|
|||
|
|
|||
|
1. 5f2459ac: 1596217772 in decimal = Friday, 31 July 2020 17:49:32
|
|||
|
2. 9fa6dc: Machine Identifier
|
|||
|
3. 2500: Process ID
|
|||
|
4. 314019: An incremental counter
|
|||
|
|
|||
|
Of the above elements, machine identifier will remain the same for as long as the database is running the same physical/virtual machine. Process ID will only change if the MongoDB process is restarted. Timestamp will be updated every second. The only challenge in guessing Object IDs by simply incrementing the counter and timestamp values, is the fact that Mongo DB generates Object IDs and assigns Object IDs at a system level.
|
|||
|
|
|||
|
The tool [https://github.com/andresriancho/mongo-objectid-predict](https://github.com/andresriancho/mongo-objectid-predict), given a starting Object ID (you can create an account and get a starting ID), it sends back about 1000 probable Object IDs that could have possibly been assigned to the next objects, so you just need to bruteforce them.
|
|||
|
|
|||
|
## Post
|
|||
|
|
|||
|
If you are root you can **modify** the **mongodb.conf** file so no credentials are needed (_noauth = true_) and **login without credentials**.
|
|||
|
|
|||
|
***
|
|||
|
|
|||
|
<figure><img src="../.gitbook/assets/image (3).png" alt=""><figcaption></figcaption></figure>
|
|||
|
|
|||
|
Join [**HackenProof Discord**](https://discord.com/invite/N3FrSbmwdy) server to communicate with experienced hackers and bug bounty hunters!
|
|||
|
|
|||
|
**Hacking Insights**\
|
|||
|
Engage with content that delves into the thrill and challenges of hacking
|
|||
|
|
|||
|
**Real-Time Hack News**\
|
|||
|
Keep up-to-date with fast-paced hacking world through real-time news and insights
|
|||
|
|
|||
|
**Latest Announcements**\
|
|||
|
Stay informed with the newest bug bounties launching and crucial platform updates
|
|||
|
|
|||
|
**Join us on** [**Discord**](https://discord.com/invite/N3FrSbmwdy) and start collaborating with top hackers today!
|
|||
|
|
|||
|
{% hint style="success" %}
|
|||
|
Learn & practice AWS Hacking:<img src="../.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="../.gitbook/assets/arte.png" alt="" data-size="line">\
|
|||
|
Learn & practice GCP Hacking: <img src="../.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks Training GCP Red Team Expert (GRTE)**<img src="../.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
|
|||
|
|
|||
|
<details>
|
|||
|
|
|||
|
<summary>Support HackTricks</summary>
|
|||
|
|
|||
|
* Check the [**subscription plans**](https://github.com/sponsors/carlospolop)!
|
|||
|
* **Join the** 💬 [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** us on **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks_live)**.**
|
|||
|
* **Share hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
|
|||
|
|
|||
|
</details>
|
|||
|
{% endhint %}
|