官术网_书友最值得收藏!

How to do it...

Let's perform the following steps:

  1. Run the following command to install brutespray on Kali:
apt install brutespray 

The following screenshot shows the output of the preceding command:

  1. Once it is installed, we can run the tool with the -h flag to view the list of all features.
  2. To run a default brute force on all of the services that were discovered by a previously run Nmap scan, we can use the following command:
brutespray --file scan.xml --threads 5

The following screenshot shows the output of the preceding command:

  1. To run the tool on one particular service, we can use the -s flag and define the service we want to perform a brute force attack on. In the following example, we will use the Nmap scan that was done on a host and only check the default credentials on the FTP service:
brutespray -file scan.xml -t 5 -s ftp

The following screenshot shows the output of the preceding command:

In the preceding screenshot, we can see that the FTP allows anonymous login, which is why the tool gave a success output for the credentials that were shown.

主站蜘蛛池模板: 钟祥市| 开阳县| 吉隆县| 兴山县| 海门市| 会昌县| 宁乡县| 义乌市| 宁明县| 河西区| 广灵县| 连云港市| 河曲县| 两当县| 石渠县| 灵璧县| 弥勒县| 阿荣旗| 宿州市| 肃北| 淄博市| 个旧市| 金坛市| 镇安县| 杭州市| 遂昌县| 青浦区| 舞阳县| 三穗县| 昌江| 甘南县| 宝丰县| 南投市| 巴中市| 永和县| 福州市| 德钦县| 高碑店市| 永年县| 抚顺市| 云安县|