15672 - Pentesting RabbitMQ Management
Last updated
Last updated
Learn & practice AWS Hacking: Learn & practice GCP Hacking:
To manually start this module you need to execute:
Once you have correctly authenticated you will see the admin console:
Also, if you have valid credentials you may find interesting the information of http://localhost:15672/api/connections
Note also that it's possible to publish data inside a queue using the API of this service with a request like:
port:15672 http
Bug bounty tip: sign up for Intigriti, a premium bug bounty platform created by hackers, for hackers! Join us at today, and start earning bounties up to $100,000!
You can learn more about RabbitMQ in . In this port you may find the RabbitMQ Management web console if the is enabled. The main page should looks like this:
The default credentials are "guest":"guest". If they aren't working you may try to .
Bug bounty tip: sign up for Intigriti, a premium bug bounty platform created by hackers, for hackers! Join us at today, and start earning bounties up to $100,000!
Learn & practice AWS Hacking: Learn & practice GCP Hacking:
Check the !
Join the 💬 or the or follow us on Twitter 🐦 .
Share hacking tricks by submitting PRs to the and github repos.