Home page logo
/
Zenmap screenshot
Intro Reference Guide Book Install Guide
Download Changelog Zenmap GUI Docs
Bug Reports OS Detection Propaganda Related Projects
In the Movies In the News
Example Nmap output

File drda-brute

Script types: portrule
Categories: intrusive, brute
Download: http://nmap.org/svn/scripts/drda-brute.nse

User Summary

Performs password guessing against databases supporting the IBM DB2 protocol such as Informix, DB2 and Derby

Script Arguments

drda-brute.threads

the amount of accounts to attempt to brute force in parallel (default 10).

drda-brute.dbname

the database name against which to guess passwords (default "SAMPLE").

passdb, unpwdb.passlimit, unpwdb.timelimit, unpwdb.userlimit, userdb

See the documentation for the unpwdb library.

Example Usage

nmap -p 50000 --script drda-brute <target>

Script Output

50000/tcp open  drda
| drda-brute:
|_  db2admin:db2admin => Valid credentials

Requires


Author: Patrik Karlsson

License: Same as Nmap--See http://nmap.org/book/man-legal.html

Nmap Site Navigation

Intro Reference Guide Book Install Guide
Download Changelog Zenmap GUI Docs
Bug Reports OS Detection Propaganda Related Projects
In the Movies In the News
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]