| Server IP : 68.178.164.50 / Your IP : 216.73.216.142 Web Server : Apache System : Linux 50.164.178.68.host.secureserver.net 5.14.0-611.26.1.el9_7.x86_64 #1 SMP PREEMPT_DYNAMIC Thu Jan 29 05:24:47 EST 2026 x86_64 User : rathinambschool ( 1053) PHP Version : 8.2.30 Disable Function : exec,passthru,shell_exec,system MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : OFF | Sudo : ON | Pkexec : ON Directory : /usr/share/nmap/scripts/ |
Upload File : |
local creds = require "creds"
description = [[
Lists all discovered credentials (e.g. from brute force and default password checking scripts) at end of scan.
]]
---
--@output
-- | creds-summary:
-- | 10.10.10.10
-- | 22/ssh
-- | lisbon:jane - Account is valid
-- | 10.10.10.20
-- | 21/ftp
-- | jane:redjohn - Account is locked
-- | 22/ssh
-- | cho:secret11 - Account is valid
-- | 23/telnet
-- | rigsby:pelt - Account is valid
-- | pelt:rigsby - Password needs to be changed at next logon
-- | 80/http
-- | lisbon:jane - Account is valid
-- | jane:redjohn - Account is locked
-- |_ cho:secret11 - Account is valid
author = "Patrik Karlsson"
license = "Same as Nmap--See https://nmap.org/book/man-legal.html"
categories = {"auth", "default", "safe"}
postrule = function()
local all = creds.Credentials:new(creds.ALL_DATA)
local tab = all:getTable()
if ( tab and next(tab) ) then return true end
end
action = function()
local all = creds.Credentials:new(creds.ALL_DATA)
return all:getTable()
end