Provided by: brutespray_1.8.1-1_all
NAME
brutespray - Python bruteforce tool
SYNOPSIS
brutespray [Usage]: brutespray [-h] -f FILE [-o OUTPUT] [-s SERVICE] [-t THREADS] [-T HOSTS] [-U USERLIST] [-P PASSLIST] [-u USERNAME] [-p PASSWORD] [-c] [-i] [-C HOST:USERNAME:PASSWORD] [-v LEVEL] [-w LEVEL].
DESCRIPTION
BruteSpray takes nmap GNMAP/JSON/XML output and automatically brute-forces services with default credentials using Medusa. BruteSpray can even find non-standard ports by using the -sV inside Nmap. ○ -f FILE, --file FILE GNMAP, JSON or XML file to parse ○ -o OUTPUT, --output OUTPUT Directory containing successful attempts ○ -s SERVICE, --service SERVICE Specify service to attack ○ -t THREADS, --threads THREADS Number of medusa threads ○ -T HOSTS, --hosts HOSTS Number of hosts to test concurrently ○ -U USERLIST, --userlist USERLIST Reference a custom username file ○ -P PASSLIST, --passlist PASSLIST Reference a custom password file ○ -u USERNAME, --username USERNAME Specify a single username ○ -p PASSWORD, --password PASSWORD Specify a single password ○ -c, --continuous Keep brute-forcing after success ○ -C HOST:USERNAME:PASSWORD, --combo HOST:USERNAME:PASSWORD Specify a combo input (host:username:password) ○ -i, --interactive Interactive mode ○ -v LEVEL, --verbose LEVEL Verbose output from medusa. Can be set from 0 to 6 (default to 5) ○ -w LEVEL, --debug LEVEL Debug error output from medusa. Can be set from 0 to 10 (default to 5) Commands: ○ brutespray -h ○ brutespray --file nmap.gnmap ○ brutespray --file nmap.xml ○ brutespray --file nmap.xml -i
EXAMPLES
Nmap network scanning example: nmap -sS -sV 192.168.0.0/24 -vv -n -oA mynetwork Using Custom Wordlists: brutespray --file mynetwork.gnmap -U /usr/share/brutespray/wordlist/user.txt -P /usr/share/brutespray/wordlist/pass.txt --threads 5 --hosts 5 Brute-Forcing Specific Services: brutespray --file mynetwork.gnmap --service ftp,ssh,telnet --threads 5 --hosts 5 Specific Credentials: brutespray --file mynetwork.gnmap -u admin -p password --threads 5 --hosts 5 Continue After Success: brutespray --file mynetwork.gnmap --threads 5 --hosts 5 -c Use Nmap XML Output: brutespray --file mynetwork.xml --threads 5 --hosts 5 Interactive Mode: brutespray --file mynetwork.xml -i
SEE ALSO
○ On github https://github.com/x90skysn3k/brutespray ○ nmap(1)
MANPAGE AUTHOR
Stephane Neveu stefneveu@gmail.com November 2022 BRUTESPRAY(8)