Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supported by thc-hydra and other popular brute forcing tools.
I have a file with the password related to server to be scan or brute force but it looks like that the command don't recognize it and I got nothing like that
─$ sudo ./crowbar.py --server 192.168.1.79/32 -b rdp -u roger -C /usr/share/nmap/nselib/data/passwords.lst 2021-03-29 13:52:46 START 2021-03-29 13:52:46 Crowbar v0.4.3-dev 2021-03-29 13:52:46 Trying 192.168.1.79:3389 2021-03-29 13:54:21 STOP 2021-03-29 13:54:21 No results found...
But the password is there in that file
let me know how to fix it
Thanks
I have a file with the password related to server to be scan or brute force but it looks like that the command don't recognize it and I got nothing like that
─$ sudo ./crowbar.py --server 192.168.1.79/32 -b rdp -u roger -C /usr/share/nmap/nselib/data/passwords.lst 2021-03-29 13:52:46 START 2021-03-29 13:52:46 Crowbar v0.4.3-dev 2021-03-29 13:52:46 Trying 192.168.1.79:3389 2021-03-29 13:54:21 STOP 2021-03-29 13:54:21 No results found...
But the password is there in that file let me know how to fix it Thanks