Nmap Development mailing list archives
[NSE] New scripts rpcap-info and rpcap-brute
From: Patrik Karlsson <patrik () cqure net>
Date: Fri, 2 Mar 2012 13:44:39 +0100
Hi list,
I just committed two new scripts rpcap-info and rpcap-brute. They both
interact with the WinPcap Remote Capture Daemon.
rpcap-info pulls information about the available interfaces and their IPs
and rpcap-brute performs password guessing when the service is secured.
In Windows, password guessing is performed against the Windows accounts on
the local system. Here's what the output of rpcap-info looks like:
PORT STATE SERVICE REASON
2002/tcp open rpcap syn-ack
| rpcap-info:
| \Device\NPF_{0D5D1364-1F1F-4892-8AC3-B838258F9BB8}
| Intel(R) PRO/1000 MT Desktop Adapter
| Addresses
| fe80:0:0:0:aabb:ccdd:eeff:0011
| 192.168.1.127/24
| \Device\NPF_{D5EAD105-B0BA-4D38-ACB4-6E95512BC228}
| Hamachi Virtual Network Interface Driver
| Addresses
|_ fe80:0:0:0:aabb:ccdd:eeff:0022
Cheers,
Patrik
--
Patrik Karlsson
http://www.cqure.net
http://twitter.com/nevdull77
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/
Current thread:
- [NSE] New scripts rpcap-info and rpcap-brute Patrik Karlsson (Mar 02)
- Re: [NSE] New scripts rpcap-info and rpcap-brute Tom Sellers (Mar 02)
- Re: [NSE] New scripts rpcap-info and rpcap-brute Patrik Karlsson (Mar 04)
- Re: [NSE] New scripts rpcap-info and rpcap-brute Tom Sellers (Mar 02)
