Performs brute force password auditing against the pcAnywhere remote access protocol.
Due to certain limitations of the protocol, bruteforcing is limited to single thread at a time. After a valid login pair is guessed the script waits some time until server becomes available again.
socket timeout for connecting to PCAnywhere (default 10s)
passdb, unpwdb.passlimit, unpwdb.timelimit, unpwdb.userlimit, userdbSee the documentation for the unpwdb library.
unittest.runSee the documentation for the unittest library.
nmap --script=pcanywhere-brute <target>
5631/tcp open pcanywheredata syn-ack | pcanywhere-brute: | Accounts | administrator:administrator - Valid credentials | Statistics |_ Performed 2 guesses in 55 seconds, average tps: 0
Author: Aleksandar Nikolic
License: Same as Nmap--See http://nmap.org/book/man-legal.html