githubEdit

PRTG Network Monitor

Discovery

  • Default ports: 80, 443, 8080

  • Nmap shows: Indy httpd (Paessler PRTG bandwidth monitor)

  • Default creds: prtgadmin:prtgadmin

# Version check
curl -s http://TARGET:8080/index.htm -A "Mozilla/5.0" | grep prtgversion

Command Injection (CVE-2018-9276)

Affects: PRTG < 18.2.39

Exploit Steps

  1. Login to PRTG admin panel

  2. Setup → Account Settings → Notifications

  3. Click Add new notification

  4. Give it a name (e.g., "pwn")

  5. Scroll down, check EXECUTE PROGRAM

  6. Select: Demo exe notification - outfile.ps1

  7. In Parameter field:

  1. Click Save

  2. Click Test on the notification

Alternative - Reverse Shell Parameter

Verify Access


Credential Locations

Search for <dbpassword> in config files.


Persistence

Can schedule notification to run at specific times for persistent callback.

Last updated