User manual

68
To add to the current bruteforce.txt, you must supply your own list of user names in a text file. Each
user name must be on its own line, followed by a carriage return. For passwords, you can use either the
supplied password source files listed above, or provide your own. As is the case with the username file,
each password must be on its own line, followed by a carriage return. Sample brutecreate.exe input and
output files are included as an example in Appendix F: Sample brutecreate.exe Output File.
Caution: Please be aware that increasing username/password combinations in bruteforce.txt will cause
sweeps in Penetrate mode to be longer. Also, brutecreate.exe does not evenly distribute
username/password combinations throughout the bruteforce.txt file. For these reasons, we suggest that
you first sweep in Identify mode to identify modems and systems. Then create a new profile that contains
only the numbers that have been identified as connecting to modems, and perform a second sweep against
only those modems, or that you sweep with Find Modems First selected.