Nmap Development mailing list archives

Re: Ncrack telnet module


From: bgqueengeek <bgqueengeek () gmail com>
Date: Thu, 15 Jun 2017 15:29:33 -0700 (MST)

Still not successful yet and I upgraded my nmap version. 

Using the following syntax to attempt a single-threaded attempt:

nmap -p 23 --max-parallelism 1 --script telnet-brute --script-args
brute.passonly=true,passdb=testPasswords.txt <ip addy>

Starting Nmap 7.50 ( https://nmap.org ) at 2017-06-15 14:43 Pacific Daylight
Time

Nmap scan report for <ip addy>
Host is up (0.18s latency).

PORT   STATE SERVICE
23/tcp open  telnet
| telnet-brute: 
|   Accounts: No valid accounts found
|_  Statistics: Performed 1 guesses in 164 seconds, average tps: 0.0


Nmap done: 1 IP address (1 host up) scanned in 167.66 seconds

Problem is I know the lone password in the testPasswords.txt file is the
valid password.

Checking the brute NSE library page for more ideas, but open to any.

Again classic telnet client like that provided in Cygwin works.

:-|



--
View this message in context: http://nmap-dev.996309.n3.nabble.com/Ncrack-telnet-module-tp28740p28747.html
Sent from the Nmap - Dev mailing list archive at Nabble.com.
_______________________________________________
Sent through the dev mailing list
https://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/


Current thread: