官术网_书友最值得收藏!

How to do it...

Let's perform the following steps:

  1. Run the following command to install brutespray on Kali:
apt install brutespray 

The following screenshot shows the output of the preceding command:

  1. Once it is installed, we can run the tool with the -h flag to view the list of all features.
  2. To run a default brute force on all of the services that were discovered by a previously run Nmap scan, we can use the following command:
brutespray --file scan.xml --threads 5

The following screenshot shows the output of the preceding command:

  1. To run the tool on one particular service, we can use the -s flag and define the service we want to perform a brute force attack on. In the following example, we will use the Nmap scan that was done on a host and only check the default credentials on the FTP service:
brutespray -file scan.xml -t 5 -s ftp

The following screenshot shows the output of the preceding command:

In the preceding screenshot, we can see that the FTP allows anonymous login, which is why the tool gave a success output for the credentials that were shown.

主站蜘蛛池模板: 安义县| 阿勒泰市| 启东市| 登封市| 庐江县| 安泽县| 石家庄市| 新干县| 平定县| 东乡族自治县| 黔南| 安宁市| 遂溪县| 合山市| 调兵山市| 罗甸县| 英超| 安达市| 班玛县| 五台县| 灵璧县| 菏泽市| 盖州市| 泰州市| 田阳县| 襄汾县| 遵化市| 泗阳县| 依兰县| 喀喇沁旗| 房山区| 衡水市| 明水县| 锦州市| 普洱| 遂宁市| 禹州市| 荔波县| 炉霍县| 东兴市| 大冶市|