mailing list archives
Re: backorifice-brute NSE script
From: Daniel Miller <bonsaiviking () gmail com>
Date: Mon, 2 May 2011 21:40:13 -0500
On Mon, May 2, 2011 at 9:13 PM, David Fifield <david () bamsoftware com> wrote:
The found password is saved in nmap.registry.backorificepassword; what
happens if the script is run against two hosts at once?
This reminds me of an idea I had, but which I do not have plans of pursuing.
With all the brute-* scripts and the unpwdb, could NSE support something
like Metasploit's Creds table? Records consist of username, password, and
service, where service a foreign-key relationship with a record defined by
host, port, and protocol (more or less). This would make a common solution
to questions like this, and would offer the opportunity for closer
integration with Metasploit, perhaps through a postrule.
Sent through the nmap-dev mailing list
Archived at http://seclists.org/nmap-dev/
Re: backorifice-brute NSE script Vlatko Kosturjak (May 04)