Sunday, August 30, 2020

BruteSpray: A Brute-forcer From Nmap Output And Automatically Attempts Default Creds On Found Services


About BruteSpray: BruteSpray takes nmap GNMAP/XML output or newline seperated JSONS and automatically brute-forces services with default credentials using Medusa. BruteSpray can even find non-standard ports by using the -sV inside Nmap.

BruteSpay's Installation
   With Debian users, the only thing you need to do is this command:
sudo apt install brutespray

   For Arch Linux user, you must install Medusa first: sudo pacman -S medusa

   And then, enter these commands to install BruteSpray:


Supported Services: ssh, ftp, telnet, vnc, mssql, mysql, postgresql, rsh, imap, nntpp, canywhere, pop3, rexec, rlogin, smbnt, smtp, svn, vmauthdv, snmp.

How to use BruteSpray?

   First do an Nmap scan with -oG nmap.gnmap or -oX nmap.xml.
   Command: python3 brutespray.py -h
   Command: python3 brutespray.py --file nmap.gnmap
   Command: python3 brutesrpay.py --file nmap.xml
   Command: python3 brutespray.py --file nmap.xml -i

   You can watch more details here:

Examples

   Using Custom Wordlists:
python3 brutespray.py --file nmap.gnmap -U /usr/share/wordlist/user.txt -P /usr/share/wordlist/pass.txt --threads 5 --hosts 5

   Brute-Forcing Specific Services:
python3 brutespray.py --file nmap.gnmap --service ftp,ssh,telnet --threads 5 --hosts 5

   Specific Credentials:
python3 brutespray.py --file nmap.gnmap -u admin -p password --threads 5 --hosts 5

   Continue After Success:
python3 brutespray.py --file nmap.gnmap --threads 5 --hosts 5 -c

   Use Nmap XML Output:
python3 brutespray.py --file nmap.xml --threads 5 --hosts 5

   Use JSON Output:
python3 brutespray.py --file out.json --threads 5 --hosts 5

   Interactive Mode: python3 brutespray.py --file nmap.xml -i

Data Specs
{"host":"127.0.0.1","port":"3306","service":"mysql"}
{"host":"127.0.0.10","port":"3306","service":"mysql"}
...


Changelog: Changelog notes are available at CHANGELOG.md.

You might like these similar tools:

More information


  1. Pentest Tools For Mac
  2. Hacker Tools For Windows
  3. Pentest Tools Port Scanner
  4. What Is Hacking Tools
  5. Top Pentest Tools
  6. Pentest Tools Port Scanner
  7. Hacker Tools 2020
  8. Pentest Tools Url Fuzzer
  9. Hack Apps
  10. Hacker Tools Free Download
  11. Hacker Tools Linux
  12. Pentest Tools Free
  13. Hack Tools Github
  14. Nsa Hacker Tools
  15. Pentest Tools Bluekeep
  16. New Hacker Tools
  17. Hacking Tools For Games
  18. Hacker Tools Hardware
  19. Pentest Tools Open Source
  20. Tools 4 Hack
  21. Pentest Tools Framework
  22. Hack Tools For Games
  23. Best Hacking Tools 2019
  24. Easy Hack Tools
  25. Hacker Tools Github
  26. Pentest Tools
  27. Best Pentesting Tools 2018
  28. Hack Tools For Mac
  29. Pentest Tools Online
  30. Hacker Tools For Windows
  31. Pentest Tools Linux
  32. Install Pentest Tools Ubuntu
  33. Hacker Tools Mac
  34. Hack Rom Tools
  35. Easy Hack Tools
  36. Hack Tool Apk
  37. Hacker Tools 2019
  38. Android Hack Tools Github
  39. Hacker Tools 2020
  40. Hacker Tools Online
  41. How To Make Hacking Tools
  42. Wifi Hacker Tools For Windows
  43. How To Hack
  44. Hackers Toolbox
  45. Hacker Tools Free
  46. Hacking Tools Github
  47. What Is Hacking Tools
  48. Pentest Tools
  49. Nsa Hack Tools
  50. Hack Tools Mac
  51. Hacking Tools Windows 10
  52. Hacking Tools For Windows 7
  53. Hack Tools Online
  54. Hacker Tools For Ios
  55. What Are Hacking Tools
  56. Pentest Tools For Android
  57. Pentest Tools List
  58. Hack App
  59. Hacker Security Tools
  60. Hacker Tools Free
  61. Nsa Hack Tools Download
  62. Hacker Tools For Ios
  63. Hacker Tools 2020
  64. Hacker Hardware Tools
  65. Hacker Tools
  66. Hack Apps
  67. Top Pentest Tools
  68. Pentest Tools Linux
  69. Hack Website Online Tool
  70. Hack And Tools
  71. Pentest Tools Website Vulnerability
  72. Pentest Tools Android
  73. Hacker Tools For Pc
  74. Pentest Tools Framework
  75. Kik Hack Tools
  76. Hacker
  77. Hack App
  78. Pentest Tools Linux
  79. Hacker Tools Online

No comments:

Post a Comment