Wednesday, May 22, 2024

Brutespray – Port Scanning and Automated Brute Force Tool

Brutespray is a Python script that provides a combination of both port scanning and automated brute force attacks against scanned services.

Scan with Nmap and use GNMAP/XML output file to Brute force Nmap open port services with default credentials using Medusa or Use your dictionary to gain access. Download the brute spray Tool Here.

Attackers Machine(Kali Linux 2.0)

  • Execute command  ./brutespray.py python script with 777 Permissions ( read, write, execute)

Scanning victim website

  • Start scanning your victim website or internal network with Nmap to check open ports and services.
  • Below Image illustrate the Nmap scan followed by saving the output of Nmap results with a filename.
  • Command executed: nmap –vv -n -oA Output filename
  • Here -oA is Output in all formats(.xml,.gnmap,nmap)

Also Read the Complete list of Kali Linux Tutorials

Nmap Output Mode

  • Previous Nmap scans will be saved in the .xml format as an output file.
  • This Output file (XML FILE) is used to perform brute force attacks against the open ports of the victim.
  • The below image illustrates the Nmap scan output file as bala.nmap 

Brutespray Startup

  • Now you can run this tool with a command: ./brutespray.py -h will run the tool with help mode.

Brutespray Interactive Mode

  • Launch Interactive mode with the command: python brutespray.py -f nmap.xml -i
  • Once Interactive mode is loaded, set your service, threads, hosts, and finally dictionary file.
brute force
  • Automate your Bruteforce attack with In build dictionary or use your own dictionary with Interactive Mode.
  • The Brutespray started its attack, relax let’s wait for a successful username and password from a dictionary file.

Brute Force Username & Password

  • Once the attack is successful username and password will be saved in the brute spray-output folder as output.

Mitigation

  • Always recommended to use a strong password as per policy.
  • Password changing policy should be 15 to 30 days will be a good practice.
  • Password lockout policy is a good one to stop brute force attacks (After 5 failure attempts account will be locked).
  • The integration of business-critical assets to SIEM( security incident & Event Management) will detect these kinds of attacks as soon as possible.
Website

Latest articles

Cloud-Based Malware Attack Abusing Google Drive & Dropbox

A phishing email with a malicious zip attachment initiates the attack. The zip contains...

OmniVision Technologies Cyber Attack, Hackers Stolen Personal Data in Ransomware Attack

OmniVision Technologies, Inc. (OVT) recently disclosed a significant security breach that compromised its clients'...

Critical Flaw In Confluence Server Let Attackers Execute Arbitrary Code

The widely used team workspace corporate wiki Confluence has been discovered to have a...

Threat Actors Leverage Bitbucket Artifacts to Breach AWS Accounts

In a recent investigation into Amazon Web Services (AWS) security breaches, Mandiant uncovered a...

Hackers Breached Western Sydney University Microsoft 365 & Sharepoint Environments

Western Sydney University has informed approximately 7,500 individuals today of an unauthorized access incident...

Memcyco Report Reveals Only 6% Of Brands Can Protect Their Customers From Digital Impersonation Fraud

Memcyco Inc., provider of digital trust technology designed to protect companies and their customers...

DoppelGänger Attack: Malware Routed Via News Websites And Social Media

A Russian influence campaign, DoppelGänger, leverages fake news websites (typosquatted and independent) to spread...

Free Webinar

Live API Attack Simulation

94% of organizations experience security problems in production APIs, and one in five suffers a data breach. As a result, cyber-attacks on APIs increased from 35% in 2022 to 46% in 2023, and this trend continues to rise.
Key takeaways include:

  • An exploit of OWASP API Top 10 vulnerability
  • A brute force ATO (Account Takeover) attack on API
  • A DDoS attack on an API
  • Positive security model automation to prevent API attacks

Related Articles