Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Nmap NSE net: ftp-brute

Information

Severity

Severity

High

Family

Family

Nmap NSE net

CVSSv2 Base

CVSSv2 Base

7.5

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:P

Solution Type

Solution Type

Mitigation

Created

Created

12 years ago

Modified

Modified

5 years ago

Summary

Tries to get FTP login credentials by guessing usernames and passwords. This uses the standard unpwdb username/password list. However, in tests FTP servers are significantly slower than other servers when responding, so the number of usernames/passwords can be artificially limited using script arguments. SYNTAX: userdb: The filename of an alternate username database. unpwdb.timelimit: The maximum amount of time that any iterator will run before stopping. The value is in seconds by default and you can follow it with 'ms', 's', 'm', or 'h' for milliseconds, seconds, minutes, or hours. For example, 'unpwdb.timelimit=30m' or 'unpwdb.timelimit=.5h' for 30 minutes. The default depends on the timing template level (see the module description). Use the value '0' to disable the time limit. unpwdb.userlimit: The maximum number of usernames 'usernames' will return (default unlimited). passdb: The filename of an alternate password database. passlimit: The number of passwords to try (default: unlimited). userlimit: The number of user accounts to try (default: unlimited). limit: Set 'userlimlt' and 'passlimit' at the same time. unpwdb.passlimit: The maximum number of passwords 'passwords' will return (default unlimited).