Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Nmap NSE net: svn-brute

Information

Severity

Severity

High

Family

Family

Nmap NSE net

CVSSv2 Base

CVSSv2 Base

7.5

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:P

Solution Type

Solution Type

Mitigation

Created

Created

12 years ago

Modified

Modified

5 years ago

Summary

Performs brute force password auditing against Subversion source code control servers. SYNTAX: brute.firstonly: stop guessing after first password is found (default: false) brute.unique: make sure that each password is only guessed once (default: true) brute.retries: the number of times to retry if recoverable failures occurs. (default: 3) svn-brute.force: force password guessing when service is accessible both anonymously and through authentication brute.mode: can be user, pass or creds and determines what mode to run the engine in. - user - the unpwdb library is used to guess passwords, every password password is tried for each user. (The user iterator is in the outer loop) - pass - the unpwdb library is used to guess passwords, each password is tried for every user. (The password iterator is in the outer loop) - creds- a set of credentials (username and password pairs) are guessed against the service. This allows for lists of known or common username and password combinations to be tested. If no mode is specified and the script has not added any custom iterator the pass mode will be enabled. brute.useraspass: guess the username as password for each user (default: true) brute.passonly: iterate over passwords only for services that provide only a password for authentication. (default: false) brute.credfile: a file containing username and password pairs delimited by '/' brute.delay: the number of seconds to wait between guesses (default: 0) svn-brute.repo: the Subversion repository against which to perform password guessing brute.threads: the number of initial worker threads, the number of active threads will be automatically adjusted.