diff --git a/scripts/ms-sql-brute.nse b/scripts/ms-sql-brute.nse index 1a04c76d7..629e67a1d 100644 --- a/scripts/ms-sql-brute.nse +++ b/scripts/ms-sql-brute.nse @@ -3,16 +3,13 @@ description = [[ Performs password guessing against Microsoft SQL Server (ms-sql). Works best in -conjunction with the ms-sql-discover script. +conjunction with the broadcast-ms-sql-discover script. + +SQL Server credentials required: No (will not benefit from mssql.username & mssql.password). -SQL Server credentials required: No (will not benefit from -mssql.username & mssql.password). Run criteria: -* Host script: Will run if the mssql.instance-all, mssql.instance-name -or mssql.instance-port script arguments are used (see mssql.lua). -* Port script: Will run against any services identified as SQL Servers, but only -if the mssql.instance-all, mssql.instance-name -and mssql.instance-port script arguments are NOT used. +* Host script: Will run if the mssql.instance-all, mssql.instance-name or mssql.instance-port script arguments are used (see mssql.lua). +* Port script: Will run against any services identified as SQL Servers, but only if the mssql.instance-all, mssql.instance-name and mssql.instance-port script arguments are NOT used. WARNING: SQL Server 2005 and later versions include support for account lockout policies (which are enforced on a per-user basis). If an account is locked out, @@ -55,6 +52,10 @@ be disabled using the mssql.scanned-ports-only script argument. -- even after a user has been locked out. This may result in many SQL -- Server logins being locked out! -- +-- @args ms-sql-brute.brute-windows-accounts Enable targeting Windows accounts +-- as part of the brute force attack. This should be used in conjunction +-- with the mssql library's mssql.domain argument. +-- -- Created 01/17/2010 - v0.1 - created by Patrik Karlsson -- Revised 02/01/2011 - v0.2 (Chris Woodbury)