Skip to main content

Overview

The Password Auditor tests network services and web applications for weak, default, or commonly used passwords. It automatically detects authentication interfaces and attempts to log in using provided wordlists. The Password Auditor is a vulnerability scanner: it actively tests for authentication weaknesses. It does not add data to your Attack Surface. Discovered weak credentials are reported as findings.

Supported targets

Target typeExamples
IP address192.168.1.1, 10.0.0.5
Hostnameserver.example.com
URLhttps://app.example.com/login

Supported services

ServiceDefault portsDescription
AMQP5672Advanced Message Queuing Protocol
Docker2375, 2376Docker API
FTP21File Transfer Protocol
HTTP80Web forms and HTTP Basic authentication
HTTPS443Web forms and HTTP Basic authentication over TLS
MQTT1883, 8883Message Queuing Telemetry Transport
MSSQL1433Microsoft SQL Server
MySQL3306MySQL/MariaDB databases
PostgreSQL5432PostgreSQL databases
RDP3389Remote Desktop Protocol
Redis6379Redis database
SMB445Windows file shares
SSH22Secure Shell
STOMP61613Simple Text Oriented Messaging Protocol
Telnet23Telnet protocol
VNC5900Virtual Network Computing
WinRM5985, 5986Windows Remote Management
SMB is disabled by default due to potential account lockout risks. Enable it explicitly when needed.

Attack types

TypeDescriptionUse case
DictionaryTry all password/username combinationsStandard auditing
Password SprayTry few passwords per user with delaysAvoid account lockouts

Parameters comparison

ParameterDictionaryPassword Spray
Tests all combinations
Lockout period1-720 min (default: 5)
Attempts per period1-50,000 (default: 2)
Account lockout riskHighLow
Password testing can lock out accounts. Coordinate with system owners and understand lockout policies before testing. Use Password Spray mode for production systems.

Dictionary attack

Tests all combinations of usernames and passwords from the wordlists. Fastest approach but may trigger account lockouts on systems with lockout policies.

Password spray attack

Tests a limited number of passwords per username, then waits before trying more. Designed to avoid triggering account lockout policies.
ParameterDescriptionDefaultRange
Lockout periodMinutes to wait between password batches51-720
Attempts per periodPasswords to try before waiting21-50,000

Scan options

Port selection

OptionDescription
Top 100 portsScan ~100 common ports for each service (default)
Custom port listSpecify exact ports to test
From URLExtract port from the target URL
The Top 100 list covers the most common ports for services the Password Auditor supports. See Port lists for the exact ports.

Wordlists

OptionDescription
Default usernamesCommon usernames (admin, root, user, etc.)
Default passwordsCommon and default passwords
Custom wordlistUpload your own username or password list
Create and manage custom wordlists in the Wordlists section. Custom wordlists allow you to include organization-specific terms, industry jargon, or credentials from previous breaches.
Build targeted wordlists using company name variations, product names, and patterns like Summer2024! or Company123. See Wordlists for wordlist management.

Additional options

OptionDescriptionDefault
Check default credentialsTry known vendor default credentials firstEnabled
Delay between attemptsSeconds to wait between login attempts (0-600)0

How it works

The Password Auditor works in these steps:
  1. Port scanning: Identifies open ports running supported authentication services
  2. Service detection: Fingerprints services to determine authentication type
  3. Form detection: For HTTP, identifies login forms, fields, and success/failure indicators
  4. Default credentials: If enabled, tries known vendor defaults for detected products
  5. Wordlist testing: Attempts login with username/password combinations respecting attack type settings
  6. Reporting: Records successful authentications as findings
The Password Auditor automatically detects login forms in web applications like Jenkins, Tomcat Manager, phpMyAdmin, and router admin interfaces.

Follow-up actions

After discovering weak credentials:
  • Change passwords immediately: Weak credentials are critical findings
  • Implement password policies: Enforce complexity and length requirements
  • Enable account lockout: Prevent brute force attacks
  • Deploy MFA: Add multi-factor authentication where possible
  • Run Network Scanner: Check for additional vulnerabilities
  • Run Port Scanner: Discover additional services to audit