Nmap Development mailing list archives
Question about unpwdb filter_iterator
From: Phil <mainframed767 () gmail com>
Date: Thu, 16 Apr 2015 15:51:09 -0700
I’m writing a few scripts for mainframe activities and they have some really interesting rules for usernames/password. I’m working on a brute force script and for now want to limit usernames to only contain characters/numbers and be less than or equal to eight chars in length. Should be easy: local valid_name = function(x) local patt = "[%w]" return (string.len(x) <= 8 and string.match(x,patt)) end later in action = function( host, port ) I put this: local users = unpwdb.filter_iterator(brute.usernames_iterator(),valid_name) And in my usernames.lst file I have 7 users: root admin administrator webadmin sysadmin netadmin test Now, what I expected to happen is that it would iterate through root, admin, webadmin, sysadmin, netadmin and test. In reality, filter_iterator returns root and admin, then nil and my script ends after only testing those two users. Am I doing something wrong? Am I misunderstanding how filter_iterator works? For now I’m working around it by placing a check in the login function for brute but I don’t think thats the right way to do it. _______________________________________________ Sent through the dev mailing list https://nmap.org/mailman/listinfo/dev Archived at http://seclists.org/nmap-dev/
Current thread:
- Question about unpwdb filter_iterator Phil (Apr 16)
- Re: Question about unpwdb filter_iterator Daniel Miller (Apr 17)
- Message not available
- Re: Question about unpwdb filter_iterator Phil (Apr 22)