Provided by: brutespray_1.8.1-2_all bug

NAME

       brutespray - Python bruteforce tool

SYNOPSIS

       brutespray  [Usage]:  brutespray  [-h]  -f  FILE  [-o  OUTPUT]  [-s  SERVICE] [-t THREADS] [-T HOSTS] [-U
       USERLIST] [-P PASSLIST] [-u USERNAME] [-p PASSWORD] [-c] [-i] [-C HOST:USERNAME:PASSWORD] [-v LEVEL]  [-w
       LEVEL].

DESCRIPTION

       BruteSpray  takes  nmap  GNMAP/JSON/XML  output  and  automatically  brute-forces  services  with default
       credentials using Medusa.

       BruteSpray can even find non-standard ports by using the -sV inside Nmap.

       ○   -f FILE, --file FILE
           GNMAP, JSON or XML file to parse

       ○   -o OUTPUT, --output OUTPUT
           Directory containing successful attempts

       ○   -s SERVICE, --service SERVICE
           Specify service to attack

       ○   -t THREADS, --threads THREADS
           Number of medusa threads

       ○   -T HOSTS, --hosts HOSTS
           Number of hosts to test concurrently

       ○   -U USERLIST, --userlist USERLIST
           Reference a custom username file

       ○   -P PASSLIST, --passlist PASSLIST
           Reference a custom password file

       ○   -u USERNAME, --username USERNAME
           Specify a single username

       ○   -p PASSWORD, --password PASSWORD
           Specify a single password

       ○   -c, --continuous
           Keep brute-forcing after success

       ○   -C HOST:USERNAME:PASSWORD, --combo HOST:USERNAME:PASSWORD
           Specify a combo input (host:username:password)

       ○   -i, --interactive
           Interactive mode

       ○   -v LEVEL, --verbose LEVEL
           Verbose output from medusa. Can be set from 0 to 6 (default to 5)

       ○   -w LEVEL, --debug LEVEL
           Debug error output from medusa. Can be set from 0 to 10 (default to 5)

       Commands:

       ○   brutespray -h

       ○   brutespray --file nmap.gnmap

       ○   brutespray --file nmap.xml

       ○   brutespray --file nmap.xml -i

EXAMPLES

       Nmap network scanning example:
              nmap -sS -sV 192.168.0.0/24 -vv -n -oA mynetwork

       Using Custom Wordlists:
              brutespray    --file     mynetwork.gnmap     -U     /usr/share/brutespray/wordlist/user.txt     -P
              /usr/share/brutespray/wordlist/pass.txt --threads 5 --hosts 5

       Brute-Forcing Specific Services:
              brutespray --file mynetwork.gnmap --service ftp,ssh,telnet --threads 5 --hosts 5

       Specific Credentials:
              brutespray --file mynetwork.gnmap -u admin -p password --threads 5 --hosts 5

       Continue After Success:
              brutespray --file mynetwork.gnmap --threads 5 --hosts 5 -c

       Use Nmap XML Output:
              brutespray --file mynetwork.xml --threads 5 --hosts 5

       Interactive Mode:
              brutespray --file mynetwork.xml -i

SEE ALSO

       ○   On github https://github.com/x90skysn3k/brutespraynmap(1)

MANPAGE AUTHOR

       Stephane Neveu stefneveu@gmail.com

                                                 September 2023                                    BRUTESPRAY(8)