On Mon, May 2, 2011 at 9:13 PM, David Fifield <david () bamsoftware com> wrote:
The found password is saved in nmap.registry.backorificepassword; what
happens if the script is run against two hosts at once?
This reminds me of an idea I had, but which I do not have plans of pursuing.
With all the brute-* scripts and the unpwdb, could NSE support something
like Metasploit's Creds table? Records consist of username, password, and
service, where service a foreign-key relationship with a record defined by
host, port, and protocol (more or less). This would make a common solution
to questions like this, and would offer the opportunity for closer
integration with Metasploit, perhaps through a postrule.
Sent through the nmap-dev mailing list
Archived at http://seclists.org/nmap-dev/