Nmap NSE 6.01: ftp-brute

Summary
Performs brute force password auditing against FTP servers. This uses the standard unpwdb username/password list. However, in tests FTP servers are significantly slower than other servers when responding, so the number of usernames/passwords can be artificially limited using script arguments. SYNTAX: userdb: The filename of an alternate username database. unpwdb.timelimit: The maximum amount of time that any iterator will run before stopping. The value is in seconds by default and you can follow it with 'ms', 's', 'm', or 'h' for milliseconds, seconds, minutes, or hours. For example, 'unpwdb.timelimit=30m' or 'unpwdb.timelimit=.5h' for 30 minutes. The default depends on the timing template level (see the module description). Use the value '0' to disable the time limit. unpwdb.userlimit: The maximum number of usernames 'usernames' will return (default unlimited). passdb: The filename of an alternate password database. passlimit: The number of passwords to try (default: unlimited). userlimit: The number of user accounts to try (default: unlimited). limit: Set 'userlimlt' and 'passlimit' at the same time. unpwdb.passlimit: The maximum number of passwords 'passwords' will return (default unlimited).