đ Password Reuse & Default Passwords
Last updated
Last updated
It's common for users and administrators to leave default credentials unchanged.
Admins often reuse the same passwords across multiple systems for convenience.
In large infrastructures, itâs easy to overlook one device (e.g., router, printer, firewall), leaving it with a weak or default password.
Applications often ship with default credentials. These are:
Meant to be changed after installation
Often left unchanged due to assumptions about internal-only access
â ī¸ Using weak or reused passwords increases the risk of compromise, especially when Single Sign-On (SSO) is not configured during initial setup.
Credential Stuffing is an attack method where default or known credentials are used across various services to gain unauthorized access.
Relies on databases of default or leaked credentials
Unlike brute-force attacks, it uses predefined username:password combinations
đ Helpful Resource:
Zyxel (ssh)
zyfwp
PrOw!aN_fXp
APC UPS (web)
apc
apc
Weblogic (web)
system
manager
Weblogic (web)
weblogic
weblogic1
, welcome(1)
Kanboard (web)
admin
admin
Vectr (web)
admin
11_ThisIsTheFirstPassword_11
Caldera (web)
admin
admin
Dlink (web)
admin
, 1234
, root
admin
, 1234
, 12345
, root
JioFiber / GigaFiber
admin
jiocentrum
Kali Linux (OS)
kali
kali
F5
admin
, root
, support
admin
, default
, (blank)
Hydra is a powerful tool to automate credential stuffing attacks.
Using Open Source Intelligence (OSINT) can guide attackers in:
Understanding the company structure and tools
Searching for known credentials (e.g., using Google)
đ Example Google Dork:
Even though routers are often better protected, internal or test systems may still have default settings.
3Com
admin
Admin
Belkin
admin
admin
BenQ
admin
Admin
D-Link
admin
Admin
Digicom
admin
Michelangelo
Linksys
admin
Admin
Netgear
admin
password
Let me know if you want this turned into a downloadable .md
file or need more topics converted!
âšī¸ These can often be found in the or using OSINT.
đ Resource: