File imap-brute
Script types:
portrule
Categories:
brute, intrusive
Download: https://svn.nmap.org/nmap/scripts/imap-brute.nse
User Summary
Performs brute force password auditing against IMAP servers using either LOGIN, PLAIN, CRAM-MD5, DIGEST-MD5 or NTLM authentication.
Script Arguments
imap-brute.auth
authentication mechanism to use LOGIN, PLAIN, CRAM-MD5, DIGEST-MD5 or NTLM
passdb, unpwdb.passlimit, unpwdb.timelimit, unpwdb.userlimit, userdb
See the documentation for the unpwdb library.creds.[service], creds.global
See the documentation for the creds library.brute.credfile, brute.delay, brute.emptypass, brute.firstonly, brute.guesses, brute.mode, brute.passonly, brute.retries, brute.start, brute.threads, brute.unique, brute.useraspass
See the documentation for the brute library.smbdomain, smbhash, smbnoguest, smbpassword, smbtype, smbusername
See the documentation for the smbauth library.Example Usage
nmap -p 143,993 --script imap-brute <host>
Script Output
PORT STATE SERVICE REASON 143/tcp open imap syn-ack | imap-brute: | Accounts | braddock:jules - Valid credentials | lane:sniper - Valid credentials | parker:scorpio - Valid credentials | Statistics |_ Performed 62 guesses in 10 seconds, average tps: 6
Requires
Author:
License: Same as Nmap--See https://nmap.org/book/man-legal.html