fbpx

BruteSpray: To Bruteforce from Nmap Outputs

BruteSpray takes nmap GNMAP/XML output and automatically brute-forces services with default credentials using Medusa. BruteSpray can even find non-standard ports by using the -sV inside Nmap.

Usage:

Using Custom Wordlists:

python brutespray.py –file nmap.gnmap -U /usr/share/wordlist/user.txt -P /usr/share/wordlist/pass.txt –threads 5 –hosts 5

Brute-Forcing Specific Services:

python brutespray.py –file nmap.gnmap –service ftp,ssh,telnet –threads 5 –hosts 5

Specific Credentials:

python brutespray.py –file nmap.gnmap -u admin -p password –threads 5 –hosts 5

Continue After Success:

python brutespray.py –file nmap.gnmap –threads 5 –hosts 5 -c

Use Nmap XML Output:

python brutespray.py –file nmap.xml –threads 5 –hosts 5


Interactive Mode:

python brutespray.py –file nmap.xml -i

Supported Services

  • ssh
  • ftp
  • telnet
  • vnc
  • mssql
  • mysql
  • postgresql
  • rsh
  • imap
  • nntp
  • pcanywhere
  • pop3
  • rexec
  • rlogin
  • smbnt
  • smtp
  • svn
  • vmauthd
Download Now and reuse Nmap output for brute-forcing.

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

Why Is Mobile App Hacking Growing In Popularity?

A cybersecurity blog post released by Varonis in March 2021 revealed the shocking truth:  Because of the Covid-19 pandemic, a huge increase in breached...

Protecting Your ID Online in 2021

With recent large hacks and increasing sophisticated schemes, we should also be protecting ourselves with even more sophisticated defensive strategies to protect our identities...

Taking a Look at the Privacy Features of Monero

Many large cryptocurrencies available today market themselves as bastions of business transparency by making their transaction data pseudonymously available on immutable, public databases. Because...

Best Tips on Cybersecurity for Students

Students, teachers, and educational institutions can all be targeted by hackers. In fact, 87% of schools have experienced one or more successful cyberattacks. There is...