RabbitMQ Management - Port 15672

Basic info

What is RabbitMQ?

RabbitMQ is a message broker that provides:

  • Message queuing - Asynchronous communication

  • Routing - Flexible message routing

  • Multiple protocols - AMQP, MQTT, STOMP

  • High availability - Clustering and mirroring

  • Management interface - Web UI and HTTP API

  • Reliability - Message persistence and acknowledgments

AMQP Architecture

Ports:

  • 15672 - HTTP (Management)

  • 15671 - HTTPS (Management, if enabled)

  • 5672 - AMQP (Message broker)

  • 5671 - AMQPS (Secure AMQP)

Default Port

Port 15672 - RabbitMQ Management (HTTP)

Reconnaissance & Enumeration

Port Scanning

Basic Nmap Scan

Sample Output:

Web Interface Discovery

Access Management UI

Login Page:

  • Default page shows RabbitMQ logo

  • Login form with username/password

  • Version information often visible

API Endpoint Discovery

API Base URL:

Common API Endpoints:

Shodan Queries

Authentication Testing

Default Credentials

Standard Default:

Test Default Credentials:

Common Credentials

Brute Force Authentication

Using Hydra

Using Metasploit

Custom Python Script

API Enumeration

Overview Information

Get Cluster Overview

Node Information

List Nodes

Connection Information

List Active Connections

Extract Client IPs:

Channel Information

List Channels

User Enumeration

List All Users

Example Output:

Virtual Host Enumeration

List Virtual Hosts

Queue Enumeration

List All Queues

Queue Information Includes:

Exchange Enumeration

List Exchanges

Binding Enumeration

List Bindings

Exploitation Techniques

Message Interception

Read Messages from Queue

Example Response:

Message Injection

Publish Message to Queue

Command Injection via Messages:

Path Traversal Exploitation

File Access via Message Attachments

Queue Manipulation

Create Malicious Queue

Bind Queue to Exchange

Purge Queue (DoS)

User Creation (Privilege Escalation)

Create Admin User

Configuration Export

Dump Complete Configuration

Denial of Service

Delete Critical Queues

Flood with Messages

Password Hash Cracking

Extract Password Hashes

Get User Hashes

Crack RabbitMQ Hashes

Hash Format:

RabbitMQ uses salted SHA-256 (or SHA-512 in newer versions)

Extract and Format:

Crack with Hashcat

Post-Exploitation

Persistence

Create Backdoor User

Create Monitoring Queue

Information Gathering

Application Architecture Discovery

Credential Harvesting

Lateral Movement

Extract Connection Information

Defense & Hardening

Change Default Credentials

Delete Guest User

Create Strong Admin User

Network Security

Bind to Localhost

Firewall Rules

Use Reverse Proxy

Enable SSL/TLS

Configure HTTPS

Access Control

Limit User Permissions

Virtual Host Isolation

Monitoring & Detection

Enable Audit Logging

Monitor Management Access

Intrusion Detection Rules

Regular Security Practices

Tools & Scripts

Essential Tools

  1. curl - HTTP API interaction

  2. rabbitmqctl - CLI management

  3. Metasploit - Exploitation modules

  4. Python pika - AMQP client library

  5. Custom scripts - Automation

Python Automation Script

Cheat Sheet

Quick Reference

Important API Endpoints

Default Credentials

Additional Resources

circle-check

Last updated