-
Notifications
You must be signed in to change notification settings - Fork 8
/
Copy pathREADME.md.bak
61 lines (37 loc) · 1.31 KB
/
README.md.bak
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
# GoSpray
Simple tool to bruteforce (spray actually) different network protocols.
GoSpray also supports restoration of interrupted tasks ("-restore").
GoSpray currently supports: **rdp, ssh, ftp, Windows LDAP, http basic** and **digest authentication**
```
go run . -ul testUsernames.txt -pl testPasswords.txt -p ftp -tl targets.txt -w 10
---------------+
Success: 192.168.56.102:user:123
-------------------
```
```
go run . -ul testUsernames.txt -pl testPasswords.txt -p ftp -tl targets.txt -w 10
--------
CTRL+C
go run . -restore
-------+
Success: user:123
-------------------
```
-ul Path to file with **usernames**
-ul Path to file with **passwords**
-p Protocol to brute ( winldap, rdp, ssh, ftp, httpbasic, httpdigest )
-tl Path to file with **targets** (one target per line ex: "http://127.0.0.1:667/protected/folder/")
-w Number of workers (threads)
-restore use "progress.gob" to restore task
**Target formats:**
```
192.168.56.102 - for ssh, rdp, ldap, ftp
192.168.56.102:21 - for ssh, rdp, ldap, ftp
http://192.168.56.102:80/2 - for basic and digest authentication
```
**Examples:**
```
spray.exe -ul testUsernames.txt -pl testPasswords.txt -p ssh -tl targets.txt -w 10
spray.exe -ul testUsernames.txt -pl testPasswords.txt -p httpbasic -tl targets.txt -w 10 -ru -rp
spray.exe -restore
```