官术网_书友最值得收藏!

How to do it...

Let's perform the following steps:

  1. Run the following command to install brutespray on Kali:
apt install brutespray 

The following screenshot shows the output of the preceding command:

  1. Once it is installed, we can run the tool with the -h flag to view the list of all features.
  2. To run a default brute force on all of the services that were discovered by a previously run Nmap scan, we can use the following command:
brutespray --file scan.xml --threads 5

The following screenshot shows the output of the preceding command:

  1. To run the tool on one particular service, we can use the -s flag and define the service we want to perform a brute force attack on. In the following example, we will use the Nmap scan that was done on a host and only check the default credentials on the FTP service:
brutespray -file scan.xml -t 5 -s ftp

The following screenshot shows the output of the preceding command:

In the preceding screenshot, we can see that the FTP allows anonymous login, which is why the tool gave a success output for the credentials that were shown.

主站蜘蛛池模板: 营口市| 榆林市| 资兴市| 玉门市| 肥乡县| 临洮县| 罗田县| 盘山县| 江北区| 萝北县| 屏东县| 余江县| 新竹县| 保靖县| 志丹县| 田阳县| 海兴县| 嘉定区| 原阳县| 金堂县| 繁昌县| 新宁县| 呼和浩特市| 肥东县| 珲春市| 静宁县| 孝感市| 明水县| 宁阳县| 鲁山县| 鄂伦春自治旗| 鄂温| 谢通门县| 平谷区| 志丹县| 永福县| 宁德市| 新民市| 西林县| 扎兰屯市| 屏边|