On Mon, May 14, 2012 at 09:07:41PM +0200, Patrik Karlsson wrote:
On Sun, May 13, 2012 at 5:51 PM, Aleksandar Nikolic
<nikolic.alek () gmail com>wrote:
I've made those changes.
See the attached script.
I tested your script and noticed two things:
1. The throughput could be further improved by lowering the socket
to a value below the timeout value for incorrect login attempts. In my
quick tests I noticed a 4x speed increase will still giving me stable
2. When an unhandled response occurs the script would miss the username
password that generated the bad response. I've changed the code so that
this combination is retried instead until the max count of retries at
point the brute engine aborts.
I've attached a patch with the changes. If you feel comfortable with
feel free to commit the updated script.
I am in agreement with Patrik. Please commit this script when you can.
(But before you do, try and make sure that the file is saved with Unix
line endings, not CRLF Windows line endings.)
Sent through the nmap-dev mailing list
Archived at http://seclists.org/nmap-dev/