官术网_书友最值得收藏!

How to do it...

Let's perform the following steps:

  1. Run the following command to install brutespray on Kali:
apt install brutespray 

The following screenshot shows the output of the preceding command:

  1. Once it is installed, we can run the tool with the -h flag to view the list of all features.
  2. To run a default brute force on all of the services that were discovered by a previously run Nmap scan, we can use the following command:
brutespray --file scan.xml --threads 5

The following screenshot shows the output of the preceding command:

  1. To run the tool on one particular service, we can use the -s flag and define the service we want to perform a brute force attack on. In the following example, we will use the Nmap scan that was done on a host and only check the default credentials on the FTP service:
brutespray -file scan.xml -t 5 -s ftp

The following screenshot shows the output of the preceding command:

In the preceding screenshot, we can see that the FTP allows anonymous login, which is why the tool gave a success output for the credentials that were shown.

主站蜘蛛池模板: 隆回县| 阜康市| 政和县| 姚安县| 民乐县| 仁怀市| 梧州市| 巴青县| 收藏| 满城县| 亳州市| 大姚县| 佛山市| 胶南市| 留坝县| 襄垣县| 南溪县| 昭平县| 苍溪县| 太湖县| 南岸区| 祁连县| 鹤壁市| 泉州市| 正宁县| 和田县| 嘉定区| 丹东市| 米脂县| 炉霍县| 南岸区| 高清| 星座| 巴彦淖尔市| 大英县| 逊克县| 故城县| 阿勒泰市| 东源县| 邹平县| 崇阳县|