Home
last modified time | relevance | path

Searched refs:brute (Results 1 – 25 of 1648) sorted by relevance

12345678910>>...66

/dports/security/nmap/nmap-7.91/scripts/
H A Dhttp-wordpress-brute.nse1 local brute = require "brute"
8 performs brute force password auditing against Wordpress CMS/blog installations.
21 -- nmap -sV --script http-wordpress-brute <target>
22 -- nmap -sV --script http-wordpress-brute
24 -- http-wordpress-brute.threads=3,brute.firstonly=true' <target>
29 -- | http-wordpress-brute:
47 -- * brute.mode = user/creds/pass - Username password iterator
51 -- @see http-form-brute.nse
55 categories = {"intrusive", "brute"}
78 Host = stdnse.get_script_args('http-wordpress-brute.hostname')
[all …]
H A Dcvs-brute.nse1 local brute = require "brute"
13 -- nmap -p 2401 --script cvs-brute <host>
17 -- | cvs-brute:
24 -- @args cvs-brute.repo string containing the name of the repository to brute
28 -- brute force the credentials for the first one.
36 categories = {"intrusive", "brute"}
37 dependencies = {"cvs-brute-repository"}
53 self.helper:connect(brute.new_socket())
66 local err = brute.Error:new("Account invalid")
91 { stdnse.get_script_args("cvs-brute.repo") } or
[all …]
H A Dhttp-joomla-brute.nse1 local brute = require "brute"
9 Performs brute force password auditing against Joomla web CMS installations.
23 -- nmap -sV --script http-joomla-brute
25 -- http-joomla-brute.threads=3,brute.firstonly=true' <target>
26 -- nmap -sV --script http-joomla-brute <target>
31 -- | http-joomla-brute:
38 -- @args http-joomla-brute.hostname Virtual Hostname Header
48 -- * brute.mode = user/creds/pass - Username password iterator
53 -- @see http-form-brute.nse
57 categories = {"intrusive", "brute"}
[all …]
H A Dftp-brute.nse1 local brute = require "brute"
8 Performs brute force password auditing against FTP servers.
17 -- nmap --script ftp-brute -p 21 <host>
19 -- This script uses brute library to perform password
25 -- | ftp-brute:
38 categories = {"intrusive", "brute"}
57 self.socket = brute.new_socket()
75 return false, brute.Error:new( "Incorrect password" )
77 local err = brute.Error:new("Too many connections")
82 local err = brute.Error:new("Unhandled response")
[all …]
H A Dscript.db3 Entry { filename = "afp-brute.nse", categories = { "brute", "intrusive", } }
9 Entry { filename = "ajp-brute.nse", categories = { "brute", "intrusive", } }
18 Entry { filename = "backorifice-brute.nse", categories = { "brute", "intrusive", } }
82 Entry { filename = "cvs-brute.nse", categories = { "brute", "intrusive", } }
88 Entry { filename = "dicom-brute.nse", categories = { "auth", "brute", } }
111 Entry { filename = "domcon-brute.nse", categories = { "brute", "intrusive", } }
114 Entry { filename = "dpap-brute.nse", categories = { "brute", "intrusive", } }
115 Entry { filename = "drda-brute.nse", categories = { "brute", "intrusive", } }
132 Entry { filename = "ftp-brute.nse", categories = { "brute", "intrusive", } }
168 Entry { filename = "http-brute.nse", categories = { "brute", "intrusive", } }
[all …]
H A Dinformix-brute.nse1 local brute = require "brute"
9 Performs brute force password auditing against IBM Informix Dynamic Server.
14 -- nmap --script informix-brute -p 9088 <host>
19 -- | informix-brute:
38 categories = {"intrusive", "brute"}
62 status, data = self.helper:Connect(brute.new_socket())
75 -- @return brute.Error object on failure
81 if ( not(nmap.registry['informix-brute']) ) then
82 nmap.registry['informix-brute'] = {}
91 return false, brute.Error:new( data )
[all …]
H A Dnje-pass-brute.nse4 local brute = require "brute"
11 z/OS JES Network Job Entry (NJE) 'I record' password brute forcer.
16 brute forces the password.
19 <code>brute.firstonly</code> script argument.
28 -- @args nje-pass-brute.ohost The target NJE server OHOST value.
30 -- @args nje-pass-brute.rhost The target NJE server RHOST value.
38 -- | nje-pass-brute:
48 categories = {"intrusive", "brute"}
119 return false, brute.Error:new( "Invalid Password" )
134 …alse, "No OHOST or RHOST set. Use --script-args nje-node-brute.rhost=\"<rhost>\",nje-node-brute.oh…
[all …]
H A Discsi-brute.nse1 local brute = require "brute"
8 Performs brute force password auditing against iSCSI targets.
12 -- @args iscsi-brute.target iSCSI target to brute-force.
16 -- | iscsi-brute:
29 categories = {"intrusive", "brute"}
41 o.target = stdnse.get_script_args('iscsi-brute.target')
47 return self.helper:connect(brute.new_socket())
57 return false, brute.Error:new( "Incorrect password" )
68 local target = stdnse.get_script_args('iscsi-brute.target')
70 return stdnse.format_output(false, "No target specified (see iscsi-brute.target)")
[all …]
H A Dipmi-brute.nse1 local brute = require "brute"
8 Performs brute force password auditing against IPMI RPC server.
13 -- nmap -sU --script ipmi-brute -p 623 <host>
18 -- | ipmi-brute:
25 categories = {"intrusive", "brute"}
41 self.socket = brute.new_socket()
60 return false, brute.Error:new(
80 return false, brute.Error:new("No response to RAKP1 message")
89 return false, brute.Error:new(
109 return false, brute.Error:new("Incorrect password")
[all …]
H A Doracle-brute.nse1 local brute = require "brute"
33 -- @see oracle-brute-stealth.nse
36 -- nmap --script oracle-brute -p 1521 --script-args oracle-brute.sid=ORCL <host>
41 -- | oracle-brute:
57 -- - oracle-brute.sid argument
73 categories = {"intrusive", "brute"}
137 -- @return brute.Error object on failure
160 return false, brute.Error:new(data)
165 local err = brute.Error:new(data)
170 return false, brute.Error:new( data )
[all …]
H A Dnessus-brute.nse1 local brute = require "brute"
12 -- nmap --script nessus-brute -p 1241 <host>
17 -- | nessus-brute:
34 categories = {"intrusive", "brute"}
50 self.socket = brute.new_socket()
62 local err = brute.Error:new( "Failed to send handshake to server" )
84 local err = brute.Error:new( "Failed to send username to server" )
98 local err = brute.Error:new( "Failed to send password to server" )
127 return false, brute.Error:new( "Incorrect password" )
134 return false, brute.Error:new( "Incorrect password" )
[all …]
H A Dopenvas-otp-brute.nse1 local brute = require "brute"
18 -- | openvas-otp-brute:
24 -- @args openvas-otp-brute.threads sets the number of threads. Default: 4
30 categories = {"intrusive", "brute"}
45 self.socket = brute.new_socket()
56 local err = brute.Error:new( "Unable to send handshake" )
71 local err = brute.Error:new( "Couldn't send user: "..username )
78 local err = brute.Error:new( "Couldn't send password: "..password )
89 return false, brute.Error:new( "Bad login" )
97 return false, brute.Error:new( "unhandled response" )
[all …]
H A Drsync-brute.nse1 local brute = require "brute"
9 Performs brute force password auditing against the rsync remote file syncing protocol.
14 -- nmap -p 873 --script rsync-brute --script-args 'rsync-brute.module=www' <ip>
19 -- | rsync-brute:
26 -- @args rsync-brute.module - the module against which brute forcing should be performed
32 categories = {"brute", "intrusive"}
47 return self.helper:connect(brute.new_socket())
55 local err = brute.Error:new( data )
59 return false, brute.Error:new( "Login failed" )
97 return fail("rsync-brute.module was not supplied")
[all …]
H A Dssh-brute.nse3 local brute = require "brute"
9 Performs brute-force password guessing against ssh servers.
15 -- --script-args ssh-brute.timeout=4s <target>
19 -- | ssh-brute:
25 -- @args ssh-brute.timeout Connection timeout (default: "5s")
30 'brute',
40 stdnse.debug(2, "creating brute driver")
56 local err = brute.Error:new(self.helper.session)
61 local err = brute.Error:new(err)
76 return false, brute.Error:new "Incorrect password"
[all …]
H A Dmysql-brute.nse1 local brute = require "brute"
18 -- nmap --script=mysql-brute <target>
22 -- | mysql-brute:
26 -- @args mysql-brute.timeout socket timeout for connecting to MySQL (default 5s)
30 categories = {"intrusive", "brute"}
37 -- Revised 05/25/2012 - v0.5 - revised by Aleksandar Nikolic, rewritten to use brute lib
56 self.socket = brute.new_socket()
60 return false, brute.Error:new( "Couldn't connect to host: " .. err )
68 return false,brute.Error:new(response)
80 return false,brute.Error:new( "Incorrect password" )
[all …]
H A Dnexpose-brute.nse1 local brute = require "brute"
10 Performs brute force password auditing against a Nexpose vulnerability scanner
15 altered by supplying the <code>brute.guesses</code> argument a different
21 -- nmap --script nexpose-brute -p 3780 <ip>
26 -- | nexpose-brute:
37 categories = {"intrusive", "brute"}
58 local err = brute.Error:new( "Couldn't send/receive HTTPS request" )
65 return false, brute.Error:new( "Bad login" )
71 return false, brute.Error:new( "incorrect response from server" )
78 local engine = brute.Engine:new(Driver, host, port)
[all …]
H A Drlogin-brute.nse1 local brute = require "brute"
9 Performs brute force password auditing against the classic UNIX rlogin (remote
16 -- nmap -p 513 --script rlogin-brute <ip>
21 -- | rlogin-brute:
35 categories = {"brute", "intrusive"}
39 -- The rlogin Driver, check the brute.lua documentation for more details
59 self.socket = brute.new_socket()
98 local err = brute.Error:new( "Expected null byte" )
111 local err = brute.Error:new( "Expected password prompt" )
132 return false, brute.Error:new( "Incorrect password" )
[all …]
H A Drexec-brute.nse1 local brute = require "brute"
12 -- nmap -p 512 --script rexec-brute <ip>
17 -- | rexec-brute:
23 -- @args rexec-brute.timeout socket timeout for connecting to rexec (default 10s)
31 categories = {"brute", "intrusive"}
35 --- Copied from telnet-brute
64 self.socket = brute.new_socket()
68 local err = brute.Error:new("Connection failed")
81 local err = brute.Error:new("Send failed")
91 return false, brute.Error:new( "Incorrect password" )
[all …]
H A Dcassandra-brute.nse1 local brute = require "brute"
10 Performs brute force password auditing against the Cassandra database.
18 -- nmap -p 9160 <ip> --script=cassandra-brute
23 -- | cassandra-brute:
32 categories = {"intrusive", "brute"}
39 local o = { host = host, port = port, socket = brute.new_socket() }
57 local err = brute.Error:new( "couldn't send length:"..combo )
85 return false, brute.Error:new( "Incorrect password" )
88 return false, brute.Error:new( "Good user, bad password" )
94 local err = brute.Error:new( response )
[all …]
H A Dhttp-brute.nse1 local brute = require "brute"
12 This script uses the unpwdb and brute libraries to perform password
19 -- nmap --script http-brute -p 80 <host>
24 -- | http-brute:
31 -- @args http-brute.hostname sets the host header in case of virtual hosting
32 -- @args http-brute.method sets the HTTP method to use (default: <code>GET</code>)
56 categories = {"intrusive", "brute"}
67 o.hostname = stdnse.get_script_args("http-brute.hostname")
106 local err = brute.Error:new(response["status-line"])
117 return false, brute.Error:new( "Incorrect password" )
[all …]
H A Dvnc-brute.nse1 local brute = require "brute"
8 Performs brute force password auditing against VNC servers.
20 -- nmap --script vnc-brute -p 5900 <host>
25 -- | vnc-brute:
43 categories = {"intrusive", "brute"}
69 -- @return brute.Error object on failure
76 local err = brute.Error:new( data )
80 local err = brute.Error:new( "VNC handshake failed" )
91 local err = brute.Error:new( data )
97 return false, brute.Error:new( "Incorrect password" )
[all …]
H A Dmongodb-brute.nse1 local brute = require "brute"
10 Performs brute force password auditing against the MongoDB database.
15 -- nmap -p 27017 <ip> --script mongodb-brute
17 -- @args mongodb-brute.db Database against which to check. Default: admin
22 -- | mongodb-brute:
32 categories = {"intrusive", "brute"}
41 local o = { host = host, port = port, sock = brute.new_socket() }
56 local err = brute.Error:new( resp )
60 return false, brute.Error:new( "Incorrect password" )
101 local engine = brute.Engine:new(Driver, host, port )
/dports/net-im/dendrite/dendrite-0.5.1/vendor/github.com/yggdrasil-network/yggdrasil-go/contrib/yggdrasil-brute-simple/
H A DMakefile3 all: util yggdrasil-brute-multi-curve25519 yggdrasil-brute-multi-ed25519
8 yggdrasil-brute-multi-ed25519: yggdrasil-brute-multi-ed25519.c util.o
9 …gcc -Wall -std=c89 -O3 -o yggdrasil-brute-multi-ed25519 -lsodium yggdrasil-brute-multi-ed25519.c u…
11 yggdrasil-brute-multi-curve25519: yggdrasil-brute-multi-curve25519.c util.o
12 …gcc -Wall -std=c89 -O3 -o yggdrasil-brute-multi-curve25519 -lsodium yggdrasil-brute-multi-curve255…
/dports/net/yggdrasil/yggdrasil-go-0.3.11/contrib/yggdrasil-brute-simple/
H A DMakefile3 all: util yggdrasil-brute-multi-curve25519 yggdrasil-brute-multi-ed25519
8 yggdrasil-brute-multi-ed25519: yggdrasil-brute-multi-ed25519.c util.o
9 …gcc -Wall -std=c89 -O3 -o yggdrasil-brute-multi-ed25519 -lsodium yggdrasil-brute-multi-ed25519.c u…
11 yggdrasil-brute-multi-curve25519: yggdrasil-brute-multi-curve25519.c util.o
12 …gcc -Wall -std=c89 -O3 -o yggdrasil-brute-multi-curve25519 -lsodium yggdrasil-brute-multi-curve255…
/dports/archivers/zip-ada/zip-ada/tools/
H A Dpack_za_bin.cmd10 upx --ultra-brute comp_zip.exe
11 upx --ultra-brute find_zip.exe
12 upx --ultra-brute rezip.exe
13 upx --ultra-brute unzipada.exe
14 upx --ultra-brute zipada.exe
15 upx --ultra-brute bunzip.exe
16 upx --ultra-brute lzma_dec.exe
17 upx --ultra-brute lzma_enc.exe

12345678910>>...66