Nmap Development mailing list archives
Re: ftp-brute.nse overhaul
From: Ron <ron () skullsecurity net>
Date: Sat, 19 Sep 2009 00:47:04 -0500
On 09/18/2009 09:36 PM, Fyodor wrote:
Thanks Ron!
No problem. It's what I do. :)
The biggest issue is that 2000 combinations isn't unreasonable normally, but in my tests (against vsftp) it would take over a half hour. I left it running when I left work today, so I'll see on Monday how long it actually takes.Authentication cracking in general can take a long time to finish. I doubt I'm the only one here who has had crackers running for months on end. I don't think 2,000 combinations is an unreasonable number by default. Limiting it to trying just 10 users x 10 passwords makes the script go fast, but only because it isn't doing much. I also worry that it could give a false sense of security to people who assume that it is doing a more thorough check. I am glad you added the limits, but I think 10x10 is too small. Now if we can speed up the cracking process itself (rather than just reducing the number of credentials tried), that would be delightful. We will probably start sharing the Ncrack user/pass DB (or at least a subset of it) with Nmap soon.
That being said, I agree -- I just committed a patch to remove the limits (though the user can still limit it using a script-arg).
Speeding up the cracking will likely be achieved best through parallelization, but I'm not in a big hurry to get tangled up in threads. :)
I agree with sharing the Ncrack DB -- the Nmap one is sort of lacking. We need to incorporate Brandon's great research! I haven't looked into what Ncrack is using, but how large is the dictionary? I think it'd be best if we could use the "most common N passwords", the same way Nmap checks the "most common N ports" (where N=1000) by default, giving the option to the user to enable more.
All right. Updating unpw has been on my list for months. The issue is, the best ways I can think of to update it are going to break compatibility (which might be find -- I don't mind fixing up the auth scripts, especially since I'll likely be parallelizing them at the same time).I think building this into unpwdb would be ideal. That allows for arguments to be shared between our "auth" scripts, and avoids duplicating the time/credential limitation code. If possible, it would be nice if users could also specify per-script arguments in case they want to set different limits for different scripts.
We talked about this idea during SoC and Patrick had some implementation ideas. The main goal was indeed to make the "auth" scripts faster. Patrick, can you tell us more about where we stand in this respect? I tend to recall that we weren't too far from being able to do this.
Will definitely incorporate this in the future. Ron -- Ron Bowes http://www.skullsecurity.org/ _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://SecLists.Org
Current thread:
- ftp-brute.nse overhaul Ron (Sep 18)
- Re: ftp-brute.nse overhaul Fyodor (Sep 18)
- Re: ftp-brute.nse overhaul Patrick Donnelly (Sep 18)
- Re: ftp-brute.nse overhaul Ron (Sep 18)
- Re: ftp-brute.nse overhaul Fyodor (Sep 18)
- Re: ftp-brute.nse overhaul Ron (Sep 18)
- Re: ftp-brute.nse overhaul Patrick Donnelly (Sep 18)
- Re: ftp-brute.nse overhaul Fyodor (Sep 18)
- Re: ftp-brute.nse overhaul Ron (Sep 18)
