Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.103697
Categoría:Settings
Título:Options for Brute Force NVTs
Resumen:This VT sets some options for the brute force / default; credentials checks.;; - Disable brute force checks:;; Disables the brute force checks done by the following VTs:;; HTTP Brute Force Logins With Default Credentials (OID: 1.3.6.1.4.1.25623.1.0.108041);; SSH Brute Force Logins With Default Credentials (OID: 1.3.6.1.4.1.25623.1.0.108013);; SMB Brute Force Logins With Default Credentials (OID: 1.3.6.1.4.1.25623.1.0.804449);; Check default community names of the SNMP Agent (OID: 1.3.6.1.4.1.25623.1.0.103914).;; - Disable default account checks:;; Disables all VTs checking for default accounts (Mainly from the 'Default Accounts' family).;; - Credentials file:;; A file containing a list of credentials. One username/password pair per line. Username and; password are separated by ':'. Please use '<>' for empty passwords or empty usernames. If; the username or the password contains a ':', please escape it with '\:'.;; Examples:;; user:userpass;; user1:userpass1;; <>:userpass2;; user3:<>;; user4:pass\:word;; user5:userpass5;; - Use only credentials listed in uploaded file:;; Use only the credentials that are listed in the uploaded file. The internal default credentials; are ignored.
Descripción:Summary:
This VT sets some options for the brute force / default
credentials checks.

- Disable brute force checks:

Disables the brute force checks done by the following VTs:

HTTP Brute Force Logins With Default Credentials (OID: 1.3.6.1.4.1.25623.1.0.108041)

SSH Brute Force Logins With Default Credentials (OID: 1.3.6.1.4.1.25623.1.0.108013)

SMB Brute Force Logins With Default Credentials (OID: 1.3.6.1.4.1.25623.1.0.804449)

Check default community names of the SNMP Agent (OID: 1.3.6.1.4.1.25623.1.0.103914).

- Disable default account checks:

Disables all VTs checking for default accounts (Mainly from the 'Default Accounts' family).

- Credentials file:

A file containing a list of credentials. One username/password pair per line. Username and
password are separated by ':'. Please use '<>' for empty passwords or empty usernames. If
the username or the password contains a ':', please escape it with '\:'.

Examples:

user:userpass

user1:userpass1

<>:userpass2

user3:<>

user4:pass\:word

user5:userpass5

- Use only credentials listed in uploaded file:

Use only the credentials that are listed in the uploaded file. The internal default credentials
are ignored.

CVSS Score:
0.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:N

CopyrightCopyright (C) 2013 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.