
Nmap Development mailing list archives
[NSE] New scripts rpcap-info and rpcap-brute
From: Patrik Karlsson <patrik () cqure net>
Date: Fri, 2 Mar 2012 13:44:39 +0100
Hi list, I just committed two new scripts rpcap-info and rpcap-brute. They both interact with the WinPcap Remote Capture Daemon. rpcap-info pulls information about the available interfaces and their IPs and rpcap-brute performs password guessing when the service is secured. In Windows, password guessing is performed against the Windows accounts on the local system. Here's what the output of rpcap-info looks like: PORT STATE SERVICE REASON 2002/tcp open rpcap syn-ack | rpcap-info: | \Device\NPF_{0D5D1364-1F1F-4892-8AC3-B838258F9BB8} | Intel(R) PRO/1000 MT Desktop Adapter | Addresses | fe80:0:0:0:aabb:ccdd:eeff:0011 | 192.168.1.127/24 | \Device\NPF_{D5EAD105-B0BA-4D38-ACB4-6E95512BC228} | Hamachi Virtual Network Interface Driver | Addresses |_ fe80:0:0:0:aabb:ccdd:eeff:0022 Cheers, Patrik -- Patrik Karlsson http://www.cqure.net http://twitter.com/nevdull77 _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://seclists.org/nmap-dev/
Current thread:
- [NSE] New scripts rpcap-info and rpcap-brute Patrik Karlsson (Mar 02)
- Re: [NSE] New scripts rpcap-info and rpcap-brute Tom Sellers (Mar 02)
- Re: [NSE] New scripts rpcap-info and rpcap-brute Patrik Karlsson (Mar 04)
- Re: [NSE] New scripts rpcap-info and rpcap-brute Tom Sellers (Mar 02)