Brute force scanning username checks

The Risk Scanner performs brute force scanning checks on this non-exhaustive list of usernames:

Note:

In addition to these username checks, the Risk Scanner uses known default usernames of different devices to validate Common Vulnerabilities and Exposures (CVE).

  • acc
  • adfexc
  • adm
  • admin
  • Admin
  • administrator
  • Administrator
  • adminttd
  • ADVMAIL
  • alex
  • anonymous
  • Anonymous
  • apc
  • asus
  • at4400
  • backup
  • bbsd-client
  • boss
  • buh
  • cellit
  • cgadmin
  • cisco
  • Cisco
  • client
  • cmaker
  • comsco
  • craft
  • customer
  • davox
  • debug
  • device
  • dhs3mt
  • dhs3pms
  • diag
  • D-Link
  • DTA
  • FIELD
  • foo
  • ftp
  • ftpadmin
  • ftpuser
  • guest
  • Guest
  • halt
  • HELLO
  • hscroot
  • install
  • intel
  • IntraStack
  • IntraSwitch
  • kermit
  • login
  • MAIL
  • manager
  • Manager
  • manuf
  • MDaemon
  • mediator
  • MGR
  • mobile
  • monitor
  • msfadmin
  • mtch
  • mtcl
  • nas
  • nasadmin
  • nasuser
  • NETOP
  • netrangr
  • NETWORK
  • NICONEX
  • operator
  • OPERATOR
  • patrol
  • PBX
  • PCUSER
  • PFCUser
  • pi
  • public
  • rdp
  • rdpamin
  • rdpuser
  • readonly
  • recovery
  • root
  • Root
  • RSBCMON
  • rwa
  • sa
  • security
  • setup
  • skyboxview
  • SPOOLMAN
  • storwatch
  • super
  • superadmin
  • superuser
  • supervisor
  • support
  • sysadm
  • SYSDBA
  • TANDBERG
  • tech
  • Test
  • user
  • User
  • user-1
  • User1
  • volition
  • vt100
  • work
  • WP