Ncrack
High-speed network authentication cracking tool for testing poor passwords on hosts and devices. Supports protocols like RDP, SSH, HTTP(S), SMB, and more for large-scale auditing.
Description
Ncrack is a high-speed network authentication cracking tool built to help companies secure their networks by proactively testing all their hosts and networking devices for poor passwords. Security professionals rely on Ncrack when auditing their clients. It was designed using a modular approach, a command-line syntax similar to Nmap, and a dynamic engine that adapts its behavior based on network feedback, allowing rapid yet reliable large-scale auditing of multiple hosts.
Ncrack’s features include a very flexible interface granting the user full control of network operations, enabling sophisticated bruteforcing attacks, timing templates for ease of use, runtime interaction similar to Nmap’s, and many more. Protocols supported include RDP, SSH, http(s), SMB, pop3(s), VNC, FTP, telnet, and additional modules like Wordpress, IMAP, CVS, SIP, Redis, PostgreSQL, MQTT, MySQL, MSSQL, MongoDB, Cassandra, WinRM, OWA, DICOM.
It allows for very sophisticated bruteforcing attacks with options for concurrent connections, authentication tries, delays, and more, making it suitable for comprehensive password security assessments.
How It Works
Ncrack operates with a modular design and dynamic engine that adapts based on network feedback. It supports target specification via hostnames, IPs, or Nmap outputs, and service specification like rdp://target or -p rdp. Users control bruteforcing via timing options (cl, CL for connections, at for tries, cd for delays), authentication inputs (-U, -P files or --user/--pass lists), and global/host/service-specific modifiers (-g, -m). It iterates credentials (passwords-first or pairwise) across protocols, providing verbose output and resuming capabilities.
Installation
sudo apt install ncrackFlags
Examples
ncrack -v -iL win.txt --user victim -P passes.txt -p rdp CL=1ncrack -v --user root localhost:22ncrack -v -T5 https://192.168.0.1ncrack -v -iX ~/nmap.xml -g CL=5,to=1hncrack -p ssh,ftp:3500,25 10.0.0.10 scanme.nmap.org google.com:80,sslncrack ssh://10.0.0.10,at=10,cl=30 -m ssh:at=50 -g cd=3000