Saturday, October 12, 2024
HomeInformation GatheringBrutespray - Port Scanning and Automated Brute Force Tool

Brutespray – Port Scanning and Automated Brute Force Tool

Published on

Malware protection

Brutespray is a Python script that provides a combination of both port scanning and automated brute force attacks against scanned services.

Scan with Nmap and use GNMAP/XML output file to Brute force Nmap open port services with default credentials using Medusa or Use your dictionary to gain access. Download the brute spray Tool Here.

Attackers Machine(Kali Linux 2.0)

  • Execute command  ./brutespray.py python script with 777 Permissions ( read, write, execute)

Scanning victim website

  • Start scanning your victim website or internal network with Nmap to check open ports and services.
  • Below Image illustrate the Nmap scan followed by saving the output of Nmap results with a filename.
  • Command executed: nmap –vv -n -oA Output filename
  • Here -oA is Output in all formats(.xml,.gnmap,nmap)

Also Read the Complete list of Kali Linux Tutorials

Nmap Output Mode

  • Previous Nmap scans will be saved in the .xml format as an output file.
  • This Output file (XML FILE) is used to perform brute force attacks against the open ports of the victim.
  • The below image illustrates the Nmap scan output file as bala.nmap 

Brutespray Startup

  • Now you can run this tool with a command: ./brutespray.py -h will run the tool with help mode.

Brutespray Interactive Mode

  • Launch Interactive mode with the command: python brutespray.py -f nmap.xml -i
  • Once Interactive mode is loaded, set your service, threads, hosts, and finally dictionary file.
brute force
  • Automate your Bruteforce attack with In build dictionary or use your own dictionary with Interactive Mode.
  • The Brutespray started its attack, relax let’s wait for a successful username and password from a dictionary file.

Brute Force Username & Password

  • Once the attack is successful username and password will be saved in the brute spray-output folder as output.

Mitigation

  • Always recommended to use a strong password as per policy.
  • Password changing policy should be 15 to 30 days will be a good practice.
  • Password lockout policy is a good one to stop brute force attacks (After 5 failure attempts account will be locked).
  • The integration of business-critical assets to SIEM( security incident & Event Management) will detect these kinds of attacks as soon as possible.

Latest articles

Threat Actor ProKYC Selling Tools To Bypass Two-Factor Authentication

Threat actors are leveraging a newly discovered deepfake tool, ProKYC, to bypass two-factor authentication...

Mozilla Warns Of Firefox Zero-Day Actively Exploited In Cyber Attacks

A critical use-after-free vulnerability affecting Firefox and Firefox Extended Support Release (ESR) is being...

SpyCloud Embeds Identity Analytics in Cybercrime Investigations Solution to Accelerate Insider and Supply Chain Risk Analysis & Threat Actor Attribution

IDLink, SpyCloud’s new automated digital identity correlation capability, is now core to its industry-leading...

Abusix and Red Sift Form New Partnership, Leveraging Automation to Mitigate Cyber Attacks

The agreement has marked over 600,000 fraudulent domains for takedown in just two months...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

AgentTesla Stealer Delivered Via Weaponized PDF and CHM Files

AgentTesla, a notorious information stealer, is observed spreading via CHM and PDF Files, which...

10 Best WiFi Hacking Apps for Android – 2024 Edition

In this article, we are sharing the top “Wi-Fi hacking Apps“ for Android applicants....

InSpy – Linkedin Information Gathering Tool for Penetration Testers

The objective of this Information Gathering tool is to extract Linkedin users based on...