Nmap Development mailing list archives
Re: [NSE] New scripts rpcap-info and rpcap-brute
From: Tom Sellers <nmap () fadedcode net>
Date: Fri, 02 Mar 2012 17:46:11 -0600
On 3/2/2012 6:44 AM, Patrik Karlsson wrote:
Hi list, I just committed two new scripts rpcap-info and rpcap-brute. They both interact with the WinPcap Remote Capture Daemon. rpcap-info pulls information about the available interfaces and their IPs and rpcap-brute performs password guessing when the service is secured. In Windows, password guessing is performed against the Windows accounts on the local system. Here's what the output of rpcap-info looks like: PORT STATE SERVICE REASON 2002/tcp open rpcap syn-ack | rpcap-info: | \Device\NPF_{0D5D1364-1F1F-4892-8AC3-B838258F9BB8} | Intel(R) PRO/1000 MT Desktop Adapter | Addresses | fe80:0:0:0:aabb:ccdd:eeff:0011 | 192.168.1.127/24 | \Device\NPF_{D5EAD105-B0BA-4D38-ACB4-6E95512BC228} | Hamachi Virtual Network Interface Driver | Addresses |_ fe80:0:0:0:aabb:ccdd:eeff:0022 Cheers, Patrik
I am pretty sure Patrik is a vampire. There is no way you can sleep and pump out as many quality scripts as he does. _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://seclists.org/nmap-dev/
Current thread:
- [NSE] New scripts rpcap-info and rpcap-brute Patrik Karlsson (Mar 02)
- Re: [NSE] New scripts rpcap-info and rpcap-brute Tom Sellers (Mar 02)
- Re: [NSE] New scripts rpcap-info and rpcap-brute Patrik Karlsson (Mar 04)
- Re: [NSE] New scripts rpcap-info and rpcap-brute Tom Sellers (Mar 02)