Performs brute force password auditing against a Nessus vulnerability scanning daemon using the NTP 1.2 protocol.
passdb, unpwdb.passlimit, unpwdb.timelimit, unpwdb.userlimit, userdbSee the documentation for the unpwdb library.
nmap --script nessus-brute -p 1241 <host>
PORT STATE SERVICE 1241/tcp open nessus | nessus-brute: | Accounts | nessus:nessus - Valid credentials | Statistics |_ Performed 35 guesses in 75 seconds, average tps: 0 This script does not appear to perform well when run using multiple threads Although, it's very slow running under a single thread it does work as intended
Author: Patrik Karlsson
License: Same as Nmap--See http://nmap.org/book/man-legal.html