From Shodan Dork to Grafana 📊Local File Inclusion
Tags
attack-pattern: | Credentials - T1589.001 Ip Addresses - T1590.005 Server - T1583.004 Server - T1584.004 Ssh - T1021.004 Tool - T1588.002 Scripting - T1064 Default Credentials Scripting |
Common Information
Type | Value |
---|---|
UUID | b28efb9a-b37f-4b18-a41a-965c9645e971 |
Fingerprint | d73f1096dd468747 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Nov. 12, 2022, 4:34 p.m. |
Added to db | Nov. 12, 2022, 6:06 p.m. |
Last updated | Nov. 17, 2024, 11:40 p.m. |
Headline | From Shodan Dork to Grafana 📊Local File Inclusion |
Title | From Shodan Dork to Grafana 📊Local File Inclusion |
Detected Hints/Tags/Attributes | 32/1/10 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 136 | ✔ | InfoSec Write-ups - Medium | https://infosecwriteups.com/feed | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | CVE | 12 | cve-2021-43798 |
|
Details | Domain | 123 | ipinfo.io |
|
Details | Domain | 243 | cve.mitre.org |
|
Details | Domain | 4128 | github.com |
|
Details | File | 1 | defaults.ini |
|
Details | File | 8 | grafana.ini |
|
Details | File | 5 | grafana.db |
|
Details | Github username | 1 | pedrohavay |
|
Details | Url | 106 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve |
|
Details | Url | 1 | https://github.com/pedrohavay/exploit-grafana-cve-2021-43798 |