Script drda-brute
Script types:
portrule
Categories:
intrusive, brute
Download: https://svn.nmap.org/nmap/scripts/drda-brute.nse
Script Summary
Performs password guessing against databases supporting the IBM DB2 protocol such as Informix, DB2 and Derby
Script Arguments
- drda-brute.threads
the amount of accounts to attempt to brute force in parallel (default 10).
- drda-brute.dbname
the database name against which to guess passwords (default
"SAMPLE"
).- passdb, unpwdb.passlimit, unpwdb.timelimit, unpwdb.userlimit, userdb
See the documentation for the unpwdb library.
Example Usage
nmap -p 50000 --script drda-brute <target>
Script Output
50000/tcp open drda | drda-brute: |_ db2admin:db2admin => Valid credentials
Requires
Author:
License: Same as Nmap--See https://nmap.org/book/man-legal.html