![]() ![]() Hydra is a tool to guess/crack valid login/password pairs. Supported services: asterisk cisco cisco-enable cvs firebird ftp ftps http-md5] mssql mysql nntp oracle-listener oracle-sid pcanywhere pcnfs pop3 postgres rdp redis rexec rlogin rsh s7-300 sip smb smtp smtp-enum snmp socks5 ssh sshkey teamspeak telnet vmauthd vnc xmpp OPT some service modules support additional input (-U for module help) Service the service to crack (see below for supported protocols) Server the target: DNS, IP or 192.168.0.0/24 (this OR the -M option) h more command line options (COMPLETE HELP) t TASKS run TASKS number of connects in parallel (per host, default: 16) M FILE list of servers to attack, one entry per line, ':' to specify port C FILE colon separated "login:pass" format, instead of -L/-P options p PASS or -P FILE try password PASS, or load several passwords from FILE l LOGIN or -L FILE login with LOGIN name, or load several logins from FILE Hydra v8.1 (c) 2014 by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes. ![]() If we just type hydra, we can see the basic hydra We will use Hydra to brute-force SSH logins.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |