Script irc-sasl-brute

Script types: portrule
Categories: brute, intrusive
Download: https://svn.nmap.org/nmap/scripts/irc-sasl-brute.nse

Script Summary

Performs brute force password auditing against IRC (Internet Relay Chat) servers supporting SASL authentication.

Script Arguments

irc-sasl-brute.threads

the number of threads to use while brute-forcing. Defaults to 2.

passdb, unpwdb.passlimit, unpwdb.timelimit, unpwdb.userlimit, userdb

See the documentation for the unpwdb library.

creds.[service], creds.global

See the documentation for the creds library.

brute.credfile, brute.delay, brute.emptypass, brute.firstonly, brute.guesses, brute.mode, brute.passonly, brute.retries, brute.start, brute.threads, brute.unique, brute.useraspass

See the documentation for the brute library.

smbdomain, smbhash, smbnoguest, smbpassword, smbtype, smbusername

See the documentation for the smbauth library.

Example Usage

nmap --script irc-sasl-brute -p 6667 <ip>

Script Output

PORT     STATE SERVICE REASON
6667/tcp open  irc     syn-ack
| irc-sasl-brute:
|   Accounts
|     root:toor - Valid credentials
|   Statistics
|_    Performed 60 guesses in 29 seconds, average tps: 2

Requires


Author:

  • Piotr Olma

License: Same as Nmap--See https://nmap.org/book/man-legal.html