官术网_书友最值得收藏!

How to do it...

Let's perform the following steps:

  1. Run the following command to install brutespray on Kali:
apt install brutespray 

The following screenshot shows the output of the preceding command:

  1. Once it is installed, we can run the tool with the -h flag to view the list of all features.
  2. To run a default brute force on all of the services that were discovered by a previously run Nmap scan, we can use the following command:
brutespray --file scan.xml --threads 5

The following screenshot shows the output of the preceding command:

  1. To run the tool on one particular service, we can use the -s flag and define the service we want to perform a brute force attack on. In the following example, we will use the Nmap scan that was done on a host and only check the default credentials on the FTP service:
brutespray -file scan.xml -t 5 -s ftp

The following screenshot shows the output of the preceding command:

In the preceding screenshot, we can see that the FTP allows anonymous login, which is why the tool gave a success output for the credentials that were shown.

主站蜘蛛池模板: 达孜县| 綦江县| 出国| 福清市| 新竹县| 鹤峰县| 瑞昌市| 习水县| 苍梧县| 得荣县| 玛纳斯县| 鄂州市| 昔阳县| 浙江省| 分宜县| 冀州市| 古丈县| 桂林市| 望谟县| 阿坝县| 定结县| 宝丰县| 奇台县| 新邵县| 白沙| 阳朔县| 达孜县| 根河市| 汕头市| 牙克石市| 皮山县| 武夷山市| 宝坻区| 东乡县| 阳山县| 南岸区| 兴海县| 黄平县| 昌宁县| 潮安县| 钦州市|