Creating Password Brute Force Lists

Managers and Unit Managers have privileges to create and manage custom password brute force lists. These lists are managed within option profiles. There may be 100 password brute force lists per type (Windows, SSH, FTP) in the subscription and each list may include up to 50 login/password combinations.

Once a list is created, it is available for selection in option profiles when the "Custom" password brute forcing option is enabled. Any user with permission to create option profiles may select up to 2 lists per brute force list type to apply to scan tasks.

See About Password Brute Forcing for more information on password brute forcing options.

 

To create a brute force list:

1.    Create a new option profile or edit an existing option profile.

2.    Click the Advanced button to see all available options.

3.    Under Password Brute Forcing, select Custom and then click the Configure button.

4.    The Configure Password Brute Forcing pop-up appears with a list of existing password brute force lists in the subscription, if any. Click the plus sign (ico_plus.jpg) to view all lists for a particular type.  

5.    Click New to create a new brute force list.

6.    In the New Brute Force List pop-up, enter a title for the list.

7.    Select the type of list you are creating: Windows, SSH or FTP.

8.    In the Login/Password field, provide user login/password combinations to be tested. Start with a login name (preceded by L:) followed on the next line with the corresponding password (preceded by P:). If the password is blank, you must still enter P: on the password line. You may include up to 50 login/password combinations in the list. Note in the sample list below that the login and password entries are on separate lines.

L:admin

P:admin

L:Guest

P:

L:Administrator

P:

L:Guest

P:qwerty

L:test

P:test

9.    Click Save.