Nmap Development mailing list archives
Re: [NSE] metasploit-msgrpc-brute
From: Aleksandar Nikolic <nikolic.alek () gmail com>
Date: Sat, 30 Jun 2012 14:04:21 +0200
I've ran a few tests and tweaked brute options to make it work well with MSF's random delays. Also , added retries. This has been commited as 29090. Aleksandar On Sat, Jun 30, 2012 at 1:27 AM, David Fifield <david () bamsoftware com> wrote:
On Fri, Jun 29, 2012 at 11:59:36PM +0200, Aleksandar Nikolic wrote:As for SSL, http lib handles that too. Also, fingerprints and version probes should be added soon so that would handle the ,so to say, non-standard ports.I added a probe and match for this service with these ports: ports 50505,55552 sslports 3790 Since we can't query the version number directly without authenticating, I included a large part of the stack trace that the service emits so that we can match up line numbers to versions. David Fifield
_______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://seclists.org/nmap-dev/
Current thread:
- [NSE] metasploit-msgrpc-brute Aleksandar Nikolic (Jun 29)
- Re: [NSE] metasploit-msgrpc-brute Patrik Karlsson (Jun 29)
- <Possible follow-ups>
- Re: [NSE] metasploit-msgrpc-brute HD Moore (Jun 29)
- Re: [NSE] metasploit-msgrpc-brute Patrik Karlsson (Jun 29)
- Re: [NSE] metasploit-msgrpc-brute Aleksandar Nikolic (Jun 29)
- Re: [NSE] metasploit-msgrpc-brute David Fifield (Jun 29)
- Re: [NSE] metasploit-msgrpc-brute Aleksandar Nikolic (Jun 30)
- Re: [NSE] metasploit-msgrpc-brute Patrik Karlsson (Jun 29)