Home page logo
/
Zenmap screenshot
Intro Reference Guide Book Install Guide
Download Changelog Zenmap GUI Docs
Bug Reports OS Detection Propaganda Related Projects
In the Movies In the News
Example Nmap output

File pop3-brute

Script types: portrule
Categories: intrusive, brute
Download: http://nmap.org/svn/scripts/pop3-brute.nse

User Summary

Tries to log into a POP3 account by guessing usernames and passwords.

Script Arguments

pop3loginmethod

The login method to use: "USER" (default), "SASL-PLAIN", "SASL-LOGIN", "SASL-CRAM-MD5", or "APOP". Defaults to "USER",

passdb, unpwdb.passlimit, unpwdb.timelimit, unpwdb.userlimit, userdb

See the documentation for the unpwdb library.

Example Usage

nmap -sV --script=pop3-brute <target>

Script Output

PORT    STATE SERVICE
110/tcp open  pop3
| pop3-brute-ported:
| Accounts:
|  user:pass => Login correct
| Statistics:
|_ Performed 8 scans in 1 seconds, average tps: 8

Requires


Author: Philip Pickering, Piotr Olma

License: Same as Nmap--See http://nmap.org/book/man-legal.html

Nmap Site Navigation

Intro Reference Guide Book Install Guide
Download Changelog Zenmap GUI Docs
Bug Reports OS Detection Propaganda Related Projects
In the Movies In the News
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]