Home page logo
/
Intro Reference Guide Book Install Guide
Download Changelog Zenmap GUI Docs
Bug Reports OS Detection Propaganda Related Projects
In the Movies In the News

Sponsors


File metasploit-msgrpc-brute

Script types: portrule
Categories: intrusive, brute
Download: http://nmap.org/svn/scripts/metasploit-msgrpc-brute.nse

User Summary

Performs brute force username and password auditing against Metasploit msgrpc interface.

Script Arguments

passdb, unpwdb.passlimit, unpwdb.timelimit, unpwdb.userlimit, userdb

See the documentation for the unpwdb library.

http.max-cache-size, http.max-pipeline, http.pipeline, http.useragent

See the documentation for the http library.

smbdomain, smbhash, smbnoguest, smbpassword, smbtype, smbusername

See the documentation for the smbauth library.

unittest.run

See the documentation for the unittest library.

Example Usage

nmap --script metasploit-msgrpc-brute -p 55553 <host>

This script uses brute library to perform password
guessing against Metasploit's msgrpc interface.

Script Output

PORT      STATE SERVICE REASON
55553/tcp open  unknown syn-ack
| metasploit-msgrpc-brute:
|   Accounts
|     root:root - Valid credentials
|   Statistics
|_    Performed 10 guesses in 10 seconds, average tps: 1

Requires


Author: Aleksandar Nikolic

License: Same as Nmap--See http://nmap.org/book/man-legal.html

Nmap Site Navigation

Intro Reference Guide Book Install Guide
Download Changelog Zenmap GUI Docs
Bug Reports OS Detection Propaganda Related Projects
In the Movies In the News
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]