'\" t .\" Title: ncrack .\" Author: [see the "Authors" section] .\" Generator: DocBook XSL Stylesheets v1.75.1 .\" Date: 10/12/2017 .\" Manual: Ncrack Reference Guide .\" Source: Ncrack .\" Language: English .\" .TH "NCRACK" "1" "10/12/2017" "Ncrack" "Ncrack Reference Guide" .\" ----------------------------------------------------------------- .\" * set default formatting .\" ----------------------------------------------------------------- .\" disable hyphenation .nh .\" disable justification (adjust text to left margin only) .ad l .\" ----------------------------------------------------------------- .\" * MAIN CONTENT STARTS HERE * .\" ----------------------------------------------------------------- .SH "NAME" ncrack \- Network authentication cracking tool .SH "SYNOPSIS" .HP \w'\fBncrack\fR\ 'u \fBncrack\fR [\fIOptions\fR] {\fItarget\ specification\fR} .SH "DESCRIPTION" .\" Ncrack: description of .PP Ncrack is an open source tool for network authentication cracking\&. It was designed for high\-speed parallel cracking using a dynamic engine that can adapt to different network situations\&. Ncrack can also be extensively fine\-tuned for special cases, though the default parameters are generic enough to cover almost every situation\&. It is built on a modular architecture that allows for easy extension to support additional protocols\&. Ncrack is designed for companies and security professionals to audit large networks for default or weak passwords in a rapid and reliable way\&. It can also be used to conduct fairly sophisticated and intensive brute force attacks against individual services\&. .if n \{\ .sp .\} .RS 4 .it 1 an-trap .nr an-no-space-flag 1 .nr an-break-flag 1 .br .ps +1 \fBWarning\fR .ps -1 .br .PP Ncrack is a project started in the Summer of 2009\&. While it is already useful for some purposes, it is still unfinished, beta quality software\&. You can help out by testing it and reporting any problems as described in the section called \(lqBUGS\(rq\&. .sp .5v .RE .PP The output from Ncrack is a list of found credentials, if any, for each of the targets specified\&. Ncrack can also print an interactive status report of progress so far and possibly additional debugging information that can help track problems, if the user selected that option\&. .PP A typical Ncrack scan is shown in Example\ \&1\&. The only Ncrack arguments used in this example are the two target IP addresses along with the the corresponding ports for each of them\&. The two example ports 21 and 22 are automatically resolved to the default services listening on them: ftp and ssh\&. .PP \fBExample\ \&1.\ \&A representative Ncrack scan\fR .\" -v: example of .sp .if n \{\ .RS 4 .\} .nf $ ncrack 10\&.0\&.0\&.130:21 192\&.168\&.1\&.2:22 Starting Ncrack 0\&.6 ( http://ncrack\&.org ) at 2016\-01\-03 22:10 EEST Discovered credentials for ftp on 10\&.0\&.0\&.130 21/tcp: 10\&.0\&.0\&.130 21/tcp ftp: admin hello1 Discovered credentials for ssh on 192\&.168\&.1\&.2 22/tcp: 192\&.168\&.1\&.2 22/tcp ssh: guest 12345 192\&.168\&.1\&.2 22/tcp ssh: admin money$ Ncrack done: 2 services scanned in 156\&.03 seconds\&. Ncrack finished\&. .fi .if n \{\ .RE .\} .PP The latest version of Ncrack can be obtained from \m[blue]\fB\%http://nmap.org/ncrack\fR\m[]\&. The latest version of this man page is available at http://nmap\&.org/ncrack/man\&.html \&. .SH "OPTIONS SUMMARY" .PP This options summary is printed when Ncrack is run with no arguments\&. It helps people remember the most common options, but is no substitute for the in\-depth documentation in the rest of this manual\&. .\" summary of options .\" command-line options: of Ncrack .sp .if n \{\ .RS 4 .\} .nf Ncrack 0\&.6 ( http://ncrack\&.org ) Usage: ncrack [Options] {target and service specification} TARGET SPECIFICATION: Can pass hostnames, IP addresses, networks, etc\&. Ex: scanme\&.nmap\&.org, microsoft\&.com/24, 192\&.168\&.0\&.1; 10\&.0\&.0\-255\&.1\-254 \-iX : Input from Nmap\'s \-oX XML output format \-iN : Input from Nmap\'s \-oN Normal output format \-iL : Input from list of hosts/networks \-\-exclude : Exclude hosts/networks \-\-excludefile : Exclude list from file SERVICE SPECIFICATION: Can pass target specific services in ://target (standard) notation or using \-p which will be applied to all hosts in non\-standard notation\&. Service arguments can be specified to be host\-specific, type of service\-specific (\-m) or global (\-g)\&. Ex: ssh://10\&.0\&.0\&.10,at=10,cl=30 \-m ssh:at=50 \-g cd=3000 Ex2: ncrack \-p ssh,ftp:3500,25 10\&.0\&.0\&.10 scanme\&.nmap\&.org google\&.com:80,ssl \-p : services will be applied to all non\-standard notation hosts \-m :: options will be applied to all services of this type \-g : options will be applied to every service globally Misc options: ssl: enable SSL over this service path : used in modules like HTTP (\'=\' needs escaping if used) db : used in modules like MongoDB to specify the database domain : used in modules like WinRM to specify the domain TIMING AND PERFORMANCE: Options which take