The Web Local
 

 

 

Default Passwords - Vendors - M

 

Hopefully the passwords below will be a good starting point for your vulnerability assessment/penetration test:

 

ManufacturerProduct VersionProtocolUser IDPasswordAccess
Marconi ATM Switches Multi ami (none) Admin
Maxdata ms2137 Multi n/a (none) Admin
Medion Routers HTTP n/a medion Admin
Megastar BIOS Console n/a star Admin
Mentec Micro/RSX Multi MICRO RSX Admin
Mercury 234234 234234 SNMP Administrator admin Admin
Mercury KT133A/686B SNMP Administrator admin Admin
Meridian PBX ANY Telnet service smile System
Micronet Access Point SP912 Telnet root default Admin
Micronet Micronet SP5002 Console mac (none) Admin
Microplex Print Server Telnet root root Admin
MicroRouter 900i Console/Multi n/a letmein Admin
Mikrotik Router OS all Telnet admin (none) Admin
Microsoft NT/2K/XP/2K3 Administrator Administrator Admin
Microsoft NT/2K/XP/2K3 Administrator (none) Admin
Microsoft NT/2K/XP/2K3 Guest Guest User
Microsoft NT/2K/XP/2K3 Guest (none) User
Microsoft NT/2K/XP/2K3 User User User
Microsoft SQL Server sa (none) Admin
Microsoft Wireless Access Point MSHOME MSHOME
Mintel Mintel PBX n/a SYSTEM Admin
Mitel admin 5215
Mitel 3300 ICP all HTTP system password Admin
Mitel SX2000 all Multi n/a (none) Admin
Motorola Cablerouter Telnet cablecom router Admin
Motorola Motorola Cablerouter cablecom router Admin
Motorola SBG900 HTTP admin motorola Admin
Motorola vanguard Multi n/a (none) Admin
Motorola Wireless Router WR850G HTTP admin motorola Admin
Motorola WR850G 4.03 HTTP admin motorola Admin
MRO software Maximo v4.1 Multi SYSADM sysadm Admin
Mutare Software EVM Admin All HTTP (none) admin Admin
MySQL All versions Asst. root (none) Admin
MySQL Eventum HTTP admin@example.com admin Admin