Brute-force service password

Hydra Switches

n - null

s - login as password

r - reversed order login

$ hydra -l 'elly' -e nsr ftp://192.168.202.148

Web

hydra 10.0.0.1 http-post-form “/admin.php:target=auth&mode=login&user=^USER^&password=^PASS^:invalid” -P /usr/share/wordlists/rockyou.txt -l admin

Logins

Use Burp suite.

  1. Intecept a login attempt.

  2. Right-lick "Send to intruder". Select Sniper if you have nly one field you want to bruteforce. If you for example already know the username. Otherwise select cluster-attack.

  3. Select your payload, your wordlist.

  4. Click attack.

  5. Look for response-length that differs from the rest.​

HTTP Basic Auth

HTTP - Post Form

HTTP - CMS -- (W)ordpress, (J)oomla or (D)rupal or (M)oodle

Hydra attack http get 401 login with a dictionary

SSH

SNMP

Remote Desktop Protocol

AFP

AJP

Cassandra Apache

CouchDB

FTP

IMAP

IRC

ISCSI

LDAP

Mongo

MySQL

OracleSQL

POP3

PostgreSQL

PPTP

Redis

Rexec

Rlogin

Rsh

Rsync

RTSP

SMB

Telnet

VNC

SMTP

Last updated