4369 - Pentesting Erlang Port Mapper Daemon (epmd)
Last updated
Last updated
Learn & practice AWS Hacking: Learn & practice GCP Hacking:
The Erlang Port Mapper Daemon (epmd) serves as a coordinator for distributed Erlang instances. It is responsible for mapping symbolic node names to machine addresses, essentially ensuring that each node name is associated with a specific address. This role of epmd is crucial for the seamless interaction and communication between different Erlang nodes across a network.
Default port: 4369
This is used by default on RabbitMQ and CouchDB installations.
If you can leak the Authentication cookie you will be able to execute code on the host. Usually, this cookie is located in ~/.erlang.cookie
and is generated by erlang at the first start. If not modified or set manually it is a random string [A:Z] with a length of 20 characters.
In this case we are going to abuse CouchDB to escalate privileges locally:
port:4369 "at port"
More information in The author also share a program to brutforce the cookie:
Example taken from You can use Canape HTB machine to practice how to exploit this vuln.
Learn & practice AWS Hacking: Learn & practice GCP Hacking:
Check the !
Join the 💬 or the or follow us on Twitter 🐦 .
Share hacking tricks by submitting PRs to the and github repos.