Nmap Development mailing list archives

Re: [NSE] New scripts rpcap-info and rpcap-brute


From: Tom Sellers <nmap () fadedcode net>
Date: Fri, 02 Mar 2012 17:46:11 -0600

On 3/2/2012 6:44 AM, Patrik Karlsson wrote:
Hi list,

I just committed two new scripts rpcap-info and rpcap-brute. They both
interact with the WinPcap Remote Capture Daemon.
rpcap-info pulls information about the available interfaces and their IPs
and rpcap-brute performs password guessing when the service is secured.
In Windows, password guessing is performed against the Windows accounts on
the local system. Here's what the output of rpcap-info looks like:

PORT     STATE SERVICE REASON
2002/tcp open  rpcap   syn-ack
| rpcap-info:
|   \Device\NPF_{0D5D1364-1F1F-4892-8AC3-B838258F9BB8}
|     Intel(R) PRO/1000 MT Desktop Adapter
|     Addresses
|         fe80:0:0:0:aabb:ccdd:eeff:0011
|         192.168.1.127/24
|   \Device\NPF_{D5EAD105-B0BA-4D38-ACB4-6E95512BC228}
|     Hamachi Virtual Network Interface Driver
|     Addresses
|_        fe80:0:0:0:aabb:ccdd:eeff:0022


Cheers,
Patrik

I am pretty sure Patrik is a vampire.  There is no way you can sleep and pump out as many quality scripts as he does.
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: