Nmap Development mailing list archives
Re: Ncrack telnet module
From: nnposter <nnposter () users sourceforge net>
Date: Wed, 14 Jun 2017 18:35:05 -0600
On 6/14/17 5:16 PM, bgqueengeek wrote:
The server (a printer in this case) has a banner and then sends "Password:". Here's the chatter: nmap -p 23 --script telnet-brute --script-args unpwdb.timelimit=0,userdb=testUsers.txt,passdb=testPasswords.txt <ip address goes here>
Brute scripts, including telnet-brute, need to be advised to perform password-only authentication. Please try to run the script by adding brute.passonly=true (and do not bother with "userdb"). Cheers, nnposter _______________________________________________ Sent through the dev mailing list https://nmap.org/mailman/listinfo/dev Archived at http://seclists.org/nmap-dev/
Current thread:
- Ncrack telnet module bgqueengeek (Jun 13)
- Re: Ncrack telnet module Daniel Miller (Jun 13)
- Re: Ncrack telnet module bgqueengeek (Jun 14)
- Re: Ncrack telnet module nnposter (Jun 14)
- Re: Ncrack telnet module bgqueengeek (Jun 14)
- Re: Ncrack telnet module nnposter (Jun 14)
- Re: Ncrack telnet module bgqueengeek (Jun 15)
- Re: Ncrack telnet module nnposter (Jun 15)
- Re: Ncrack telnet module bgqueengeek (Jun 19)
- Re: Ncrack telnet module bgqueengeek (Jun 14)
- Re: Ncrack telnet module Daniel Miller (Jun 13)