Thursday, January 23, 2025
HomeInformation GatheringBrutespray - Port Scanning and Automated Brute Force Tool

Brutespray – Port Scanning and Automated Brute Force Tool

Published on

SIEM as a Service

Follow Us on Google News

Brutespray is a Python script that provides a combination of both port scanning and automated brute force attacks against scanned services.

Scan with Nmap and use GNMAP/XML output file to Brute force Nmap open port services with default credentials using Medusa or Use your dictionary to gain access. Download the brute spray Tool Here.

Attackers Machine(Kali Linux 2.0)

  • Execute command  ./brutespray.py python script with 777 Permissions ( read, write, execute)

Scanning victim website

  • Start scanning your victim website or internal network with Nmap to check open ports and services.
  • Below Image illustrate the Nmap scan followed by saving the output of Nmap results with a filename.
  • Command executed: nmap –vv -n -oA Output filename
  • Here -oA is Output in all formats(.xml,.gnmap,nmap)

Also Read the Complete list of Kali Linux Tutorials

Nmap Output Mode

  • Previous Nmap scans will be saved in the .xml format as an output file.
  • This Output file (XML FILE) is used to perform brute force attacks against the open ports of the victim.
  • The below image illustrates the Nmap scan output file as bala.nmap 

Brutespray Startup

  • Now you can run this tool with a command: ./brutespray.py -h will run the tool with help mode.

Brutespray Interactive Mode

  • Launch Interactive mode with the command: python brutespray.py -f nmap.xml -i
  • Once Interactive mode is loaded, set your service, threads, hosts, and finally dictionary file.
brute force
  • Automate your Bruteforce attack with In build dictionary or use your own dictionary with Interactive Mode.
  • The Brutespray started its attack, relax let’s wait for a successful username and password from a dictionary file.

Brute Force Username & Password

  • Once the attack is successful username and password will be saved in the brute spray-output folder as output.

Mitigation

  • Always recommended to use a strong password as per policy.
  • Password changing policy should be 15 to 30 days will be a good practice.
  • Password lockout policy is a good one to stop brute force attacks (After 5 failure attempts account will be locked).
  • The integration of business-critical assets to SIEM( security incident & Event Management) will detect these kinds of attacks as soon as possible.

Latest articles

Critical Vulnerability in Next.js Framework Exposes Websites to Cache Poisoning and XSS Attacks

A new report has put the spotlight on potential security vulnerabilities within the popular...

New Cookie Sandwich Technique Allows Stealing of HttpOnly Cookies

The "Cookie Sandwich Attack" showcases a sophisticated way of exploiting inconsistencies in cookie parsing...

GhostGPT – Jailbreaked ChatGPT that Creates Malware & Exploits

Artificial intelligence (AI) tools have revolutionized how we approach everyday tasks, but they also...

Tycoon 2FA Phishing Kit Using Specially Crafted Code to Evade Detection

The rapid evolution of Phishing-as-a-Service (PhaaS) platforms is reshaping the threat landscape, enabling attackers...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Chinese Hackers Attacking Microsoft Customers With Sophisticated Password Spray Attacks

Researchers have identified a network of compromised devices, CovertNetwork-1658, used by Chinese threat actors...

AgentTesla Stealer Delivered Via Weaponized PDF and CHM Files

AgentTesla, a notorious information stealer, is observed spreading via CHM and PDF Files, which...

10 Best WiFi Hacking Apps for Android – 2024 Edition

In this article, we are sharing the top “Wi-Fi hacking Apps“ for Android applicants....