Nmap Development mailing list archives

Out of Memory


From: ". ." <seattleitguy () outlook com>
Date: Thu, 3 Dec 2015 09:30:48 -0800

I am trying to use the telnet-brute script using crackstation's smaller and larger password lists. I keep getting an 
out of memory error.

I am using Windows 10 with the latest version of Nmap (7.0.0).

Command:
nmap -p 2601 -d --script +telnet-brute --script-args passdb=/pwd/cshuman.txt,brute.retries=2 192.168.0.1

Here is the debug:

Starting Nmap 7.00 ( https://nmap.org ) at 2015-12-03 09:27 Pacific Standard Time

Winpcap present, dynamic linked to: WinPcap version 4.1.3 (packet.dll version 4.1.0.2980), based on libpcap version 1.0 
branch 1_0_rel0b (20091008)

--------------- Timing report ---------------

  hostgroups: min 1, max 100000

  rtt-timeouts: init 1000, min 100, max 10000

  max-scan-delay: TCP 1000, UDP 1000, SCTP 1000

  parallelism: min 0, max 0

  max-retries: 10, host-timeout: 0

  min-rate: 0, max-rate: 0

---------------------------------------------

NSE: Using Lua 5.2.

NSE: Arguments from CLI: passdb=/pwd/cshuman.txt,brute.retries=2

NSE: Arguments parsed: passdb=/pwd/cshuman.txt,brute.retries=2

NSE: Loaded 1 scripts for scanning.

NSE: Script Pre-scanning.

NSE: Starting runlevel 1 (of 1) scan.

Initiating NSE at 09:27

Completed NSE at 09:27, 0.00s elapsed

Initiating ARP Ping Scan at 09:27

Scanning 192.168.0.1 [1 port]

Packet capture filter (device eth0): arp and arp[18:4] = 0xC8600075 and arp[22:2] = 0xF715

Completed ARP Ping Scan at 09:27, 0.13s elapsed (1 total hosts)

Overall sending rates: 7.87 packets / s, 330.71 bytes / s.

DNS resolution of 1 IPs took 0.39s. Mode: Async [#: 0, OK: 0, NX: 0, DR: 0, SF: 0, TR: 0, CN: 0]

Initiating SYN Stealth Scan at 09:27

Scanning 192.168.0.1 [1 port]

Packet capture filter (device eth0): dst host 192.168.0.21 and (icmp or icmp6 or ((tcp or udp or sctp) and (src host 
192.168.0.1)))

Discovered open port 2601/tcp on 192.168.0.1

Completed SYN Stealth Scan at 09:27, 0.01s elapsed (1 total ports)

Overall sending rates: 200.00 packets / s, 8800.00 bytes / s.

NSE: Script scanning 192.168.0.1.

NSE: Starting runlevel 1 (of 1) scan.

Initiating NSE at 09:27

NSE: Starting telnet-brute against 192.168.0.1:2601.

NSE: telnet-brute against 192.168.0.1:2601 threw an error!

not enough memory

stack traceback:

    C:\Program Files (x86)\Nmap/nselib/unpwdb.lua:114: in function 'filltable'

    C:\Program Files (x86)\Nmap/nselib/unpwdb.lua:206: in function 'passwords_raw'

    C:\Program Files (x86)\Nmap/nselib/unpwdb.lua:278: in function 'passwords'

    C:\Program Files (x86)\Nmap/nselib/brute.lua:754: in function 'passwords_iterator'

    C:\Program Files (x86)\Nmap/nselib/brute.lua:376: in function 'new'

    C:\Program Files (x86)\Nmap/scripts\telnet-brute.nse:683: in function <C:\Program Files 
(x86)\Nmap/scripts\telnet-brute.nse:670>

    (...tail calls...)



Completed NSE at 09:27, 52.59s elapsed

Nmap scan report for 192.168.0.1

mass_dns: warning: Unable to determine any DNS servers. Reverse DNS is disabled. Try using --system-dns or specify 
valid servers with --dns-servers

Host is up, received arp-response (0.0059s latency).

Scanned at 2015-12-03 09:27:06 Pacific Standard Time for 53s

PORT     STATE SERVICE REASON

2601/tcp open  zebra   syn-ack ttl 64

Final times for host: srtt: 5875 rttvar: 4750  to: 100000



NSE: Script Post-scanning.

NSE: Starting runlevel 1 (of 1) scan.

Initiating NSE at 09:28

Completed NSE at 09:28, 0.00s elapsed

Read from C:\Program Files (x86)\Nmap: nmap-mac-prefixes nmap-payloads nmap-services.

Nmap done: 1 IP address (1 host up) scanned in 71.62 seconds

           Raw packets sent: 2 (72B) | Rcvd: 2 (72B)


                                          
_______________________________________________
Sent through the dev mailing list
https://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/

Current thread: