SAP Web GUI Login Brute Forcer...

- AV AC AU C I A
发布: 2024-09-01
修订: 2025-04-13

This Metasploit module attempts to brute force SAP username and passwords through the SAP Web GUI service. Default clients can be tested without needing to set a CLIENT. Common and default user/password combinations can be tested just setting the DEFAULT_CRED variable to true. The MSF_DATA_DIRECTORY/wordlists/sap_default.txt path store stores these default combinations.

0%
暂无可用Exp或PoC
当前有0条受影响产品信息