Brutespray
Brutespray is a bruteforce tool that automates password spraying against services discovered in Nmap scans and other vulnerability scanner outputs. It supports interactive mode and has been rewritten in Golang for faster performance without external dependencies.
Description
Brutespray automates the process of bruteforcing services identified in scan results from tools like Nmap, Nexpose, and Nessus. It takes inputs in formats such as GNMAP, XML, JSON, and .nessus files, parsing hosts and open services for targeted password attacks. The tool uses Medusa as its backend engine for the actual bruteforcing operations across protocols like FTP, SSH, and MySQL.
Common use cases include attacking all services in a Nmap scan with custom user and password wordlists, or entering interactive mode to selectively bruteforce specific services. It supports threading for parallel host and thread execution to optimize speed. The Golang rewrite eliminates the need for additional tools, making it faster and more extensive than the original Python version.
Brutespray is particularly useful in penetration testing scenarios where large numbers of hosts with common services need credential testing. It provides progress indicators and supports combo wordlists or single credentials alongside dictionary attacks.
How It Works
Brutespray parses scanner outputs (Nmap GNMAP/XML, Nexpose XML, Nessus .nessus, JSON lists) to extract hosts and open services/ports. It then launches Medusa bruteforcing sessions against identified services like FTP (port 21), SSH (port 22), MySQL (port 3306), using specified userlists, passlists, or combo files. The tool manages parallel threads (-t) and parallel hosts (-T) for concurrent attacks, displaying real-time progress like 'ACCOUNT CHECK: [mysql] Host: IP User: name Password: pass'. Interactive mode prompts for service selection, thread counts, wordlists, and single credentials. The Golang version operates independently without external tool dependencies.
Installation
sudo apt install brutesprayFlags
Examples
brutespray --file nas.gnmap -U /usr/share/wordlists/metasploit/unix_users.txt -P /usr/share/wordlists/metasploit/password.lst --threads 3 --hosts 1brutespray -i -f nas.gnmapbrutespray -hbrutespray -Sbrutespray -H mysql://192.168.86.4:3306brutespray --file scan.gnmap -C user1:pass1brutespray -P nas.gnmap