Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Options for Brute Force NVTs

Information

Severity

Severity

Informational

Family

Family

Settings

CVSSv2 Base

CVSSv2 Base

0.0

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:N/A:N

Created

Created

10 years ago

Modified

Modified

5 years ago

Summary

This NVT set some options for the brute force credentials checks. - Disable brute force checks: Disables the brute force cecks done by the following NVTs: HTTP Brute Force Logins With Default Credentials (OID: 1.3.6.1.4.1.25623.1.0.108041) SSH Brute Force Logins With Default Credentials (OID: 1.3.6.1.4.1.25623.1.0.108013) SMB Brute Force Logins With Default Credentials (OID: 1.3.6.1.4.1.25623.1.0.804449) Check default community names of the SNMP Agent (OID: 1.3.6.1.4.1.25623.1.0.103914). - Disable default account checks: Disables all NVTs checking for default accounts (Mainly from the 'Default Accounts' family). - Credentials file: A file containing a list of credentials. One username/password pair per line. Username and password are separated by ':'. Please use 'none' for empty passwords or empty usernames. If the username or the password contains a ':', please escape it with '\:'. Examples: user:userpass user1:userpass1 none:userpass2 user3:none user4:pass\:word user5:userpass5 - Use only credentials listed in uploaded file: Use only the credentials that are listed in the uploaded file. The internal default credentials are ignored.