New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Nmap telnet brute force error #1345

Open
hkaraoglu opened this Issue Oct 8, 2018 · 1 comment

Comments

Projects
None yet
2 participants
@hkaraoglu

hkaraoglu commented Oct 8, 2018

Input:
nmap -p23 -script telnet-brute.nse -script-args userdb=user.txt,passdb=password.txt {{MY_IP_ADDRESS}}

Output:
Starting Nmap 7.70 ( https://nmap.org ) at 2018-10-08 09:54
Assertion failed: lua_status(L) == LUA_YIELD, file ..\nse_nsock.cc, line 612

@nnposter

This comment has been minimized.

Show comment
Hide comment
@nnposter

nnposter Oct 8, 2018

There has been a recent bug fix related to concurrency and Nmap sockets (#1233). Can you try to reproduce the issue by swapping library nselib/brute.luawith the current version?

In the meantime you might be able to work around it by dropping the thread count to 1:

nmap ... --script-args brute.threads=1,brute.start=1 ...

nnposter commented Oct 8, 2018

There has been a recent bug fix related to concurrency and Nmap sockets (#1233). Can you try to reproduce the issue by swapping library nselib/brute.luawith the current version?

In the meantime you might be able to work around it by dropping the thread count to 1:

nmap ... --script-args brute.threads=1,brute.start=1 ...
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment