Nmap Development mailing list archives
Re: Request for Ncrack/NSE
From: Brandon Enright <bmenrigh () ucsd edu>
Date: Tue, 30 Mar 2010 21:02:59 +0000
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Tue, 30 Mar 2010 15:58:02 -0500 Ron <ron () skullsecurity net> wrote:
Apparently, nobody has a good program to crack passwords for rdp yet (port 3389) -- there are patches for the "rdesktop" program, and a Windows tool called tsgrinder, but both are slow/unreliable. Anybody feel like researching the protocol and writing a tool?
Having been on the receiving side of some serious mass RDP pwnage, I know good tools exist in the underground. I have wanted to audit our machines for weak passwords via RDP but haven't been able to. I did some research about a year back and it was my understanding that there was no protocol code that tells you if you log in successfully. Unless somebody has figured something out recently I think you must validate successful login via image analysis. That is, does it *look* like you logged in. I know on at least one of our boxes we found a RDP scanning tool. If I can think of where I put that binary I'll send it along. Brandon -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.14 (GNU/Linux) iEYEARECAAYFAkuyZwMACgkQqaGPzAsl94LOSACfVNIUzqbMRxobGkWuShu9+4Rq cWIAnAv12sSgIv1F2D3ZbmX0zFTnijmk =yYFV -----END PGP SIGNATURE----- _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://seclists.org/nmap-dev/
Current thread:
- Request for Ncrack/NSE Ron (Mar 30)
- Re: Request for Ncrack/NSE Brandon Enright (Mar 30)
- Re: Request for Ncrack/NSE Patrik Karlsson (Mar 30)
- Re: Request for Ncrack/NSE Ron (Mar 30)
- Re: Request for Ncrack/NSE Lineker Tomazeli (Mar 30)
- Re: Request for Ncrack/NSE Patrik Karlsson (Mar 30)
- Re: Request for Ncrack/NSE Patrik Karlsson (Mar 30)
- Re: Request for Ncrack/NSE Brandon Enright (Mar 30)