BruteSpray - Brute-Forcing from Nmap output (Automatically attempts default creds on found services)
BruteSpray takes nmap GNMAP output and automatically brute-forces services with default credentials using Medusa. BruteSpray can even find non-standard ports by using the -sV inside Nmap.
Usage
First do an nmap scan with '-oA nmap.gnmap'.
Command: python brutespray.py -h
Example: python brutespray.py --file nmap.gnmap --services all --threads 3 --hosts 5
Supported Services
- ssh
- ftp
- telnet
- vnc
- mssql
- mysql
- postgresql
- rsh
- imap
- nntp
- pcanywhere
- pop3
- rexec
- rlogin
- smbnt
- smtp
- snmp
- svn
- vmauthd
BruteSpray - Brute-Forcing from Nmap output (Automatically attempts default creds on found services)
Reviewed by Zion3R
on
11:13 AM
Rating:
![BruteSpray - Brute-Forcing from Nmap output (Automatically attempts default creds on found services)](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5FIjY2YnjZUzYkY-ImjiMlHgMa2vFculdE5XNhwzd95AwfQ1TQboIl7rbvJ_T4eBT4-ryxCRAQvLgDV4uL-5uv77nuS_i4aUcssqwLHECBa3k-i5j5ZwuMjf5Eh7e41kLBHeKXQvwmQI/s72-c/brutespray.png)