Brute force scanning username checks
The Risk Scanner performs brute force scanning checks on this non-exhaustive list of usernames:
Note:
In addition to these username checks, the Risk Scanner uses known default usernames of different devices to validate Common Vulnerabilities and Exposures (CVE).
- acc
- adfexc
- adm
- admin
- Admin
- administrator
- Administrator
- adminttd
- ADVMAIL
- alex
- anonymous
- Anonymous
- apc
- asus
- at4400
- backup
- bbsd-client
- boss
- buh
- cellit
- cgadmin
- cisco
- Cisco
- client
- cmaker
- comsco
- craft
- customer
- davox
- debug
- device
- dhs3mt
- dhs3pms
- diag
- D-Link
- DTA
- FIELD
- foo
- ftp
- ftpadmin
- ftpuser
- guest
- Guest
- halt
- HELLO
- hscroot
- install
- intel
- IntraStack
- IntraSwitch
- kermit
- login
- manager
- Manager
- manuf
- MDaemon
- mediator
- MGR
- mobile
- monitor
- msfadmin
- mtch
- mtcl
- nas
- nasadmin
- nasuser
- NETOP
- netrangr
- NETWORK
- NICONEX
- operator
- OPERATOR
- patrol
- PBX
- PCUSER
- PFCUser
- pi
- public
- rdp
- rdpamin
- rdpuser
- readonly
- recovery
- root
- Root
- RSBCMON
- rwa
- sa
- security
- setup
- skyboxview
- SPOOLMAN
- storwatch
- super
- superadmin
- superuser
- supervisor
- support
- sysadm
- SYSDBA
- TANDBERG
- tech
- Test
- user
- User
- user-1
- User1
- volition
- vt100
- work
- WP