Nmap Development mailing list archives

RE: Password profiling in NSE


From: Giacomo Mantani <giacomo.mantani () studio unibo it>
Date: Fri, 15 Apr 2016 10:24:10 +0000

Gisle Vanem,

Ncrack could use generated password list from gathering stage
as well as other brute scripts mentioned by George do.

George, is it correct?

--

Giacomo Mantani

________________________________________
From: dev [dev-bounces () nmap org] on behalf of Gisle Vanem [gvanem () yahoo no]
Sent: Friday, April 15, 2016 11:15 AM
To: dev () nmap org
Subject: Re: Password profiling in NSE

George Chatzisofroniou wrote:

To implement the feature I created a new NSE library: pwdprofile. It
provides a method for the NSE scripts to pass any keywords to the
library (using NSE registry), mangling algorithms, as well as methods
for adding the generated wordlist to the passwords iterator used by
the brute force engine.

Nice work. But where does this leave Ncrack [1]?
Seems your work and the LUA-interface in Nmap is better suited
for password cracking than Ncrack is. At the moment anyway.

[1] https://nmap.org/ncrack/
    https://github.com/nmap/ncrack

--
--gv
_______________________________________________
Sent through the dev mailing list
https://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/
_______________________________________________
Sent through the dev mailing list
https://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/


Current thread: