官术网_书友最值得收藏!

How to do it...

Let's perform the following steps:

  1. Run the following command to install brutespray on Kali:
apt install brutespray 

The following screenshot shows the output of the preceding command:

  1. Once it is installed, we can run the tool with the -h flag to view the list of all features.
  2. To run a default brute force on all of the services that were discovered by a previously run Nmap scan, we can use the following command:
brutespray --file scan.xml --threads 5

The following screenshot shows the output of the preceding command:

  1. To run the tool on one particular service, we can use the -s flag and define the service we want to perform a brute force attack on. In the following example, we will use the Nmap scan that was done on a host and only check the default credentials on the FTP service:
brutespray -file scan.xml -t 5 -s ftp

The following screenshot shows the output of the preceding command:

In the preceding screenshot, we can see that the FTP allows anonymous login, which is why the tool gave a success output for the credentials that were shown.

主站蜘蛛池模板: 宜兰县| 渭南市| 安塞县| 光泽县| 巴林左旗| 连南| 长寿区| 阳新县| 甘南县| 城固县| 全椒县| 台中市| 剑川县| 克山县| 自贡市| 乐陵市| 平陆县| 乐山市| 共和县| 宝丰县| 望谟县| 抚宁县| 郎溪县| 巴南区| 大荔县| 邢台县| 鄱阳县| 云阳县| 如东县| 恩施市| 铜川市| 侯马市| 新河县| 湟中县| 子长县| 丘北县| 宁远县| 封开县| 江达县| 麻江县| 澄江县|