hydra
Parallelized login cracker which supports numerous protocols to attack. It is very fast and flexible, and new modules are easy to add. This tool makes it possible for researchers and security consultants to show how easy it would be to gain unauthorized access to a system remotely.
Name:hydra
Category:Passwords
Publisher:trickest-mhmdiaa
Created:7/14/2023
Container:
quay.io/trickest/thchydra:93abd60-patch-3
Output Type:
License:Unknown
Source:View Source
Parameters
-4
use IPv4 addresses (default)-6
use IPv6 addresses (put always in [] also in servers-to-attack)-s
if the service is on a different default port, define it here-d
debug mode-l
login with login name-q
do not print messages about connection errors-L
load several logins from file
the target: DNS, IP or 192.168.0.0/24 (this OR the servers-to-attack option)-O
use old SSL v2 and v3-M
List of servers to attack, one entry per line, ':' to specify port
the service to crack. Supported: adam6500 asterisk cisco cisco-enable cvs ftp[s] http[s]-{head|get|post} http[s]-{get|post}-form http-proxy http-proxy-urlenum icq imap[s] irc ldap2[s] ldap3[-{cram|digest}md5][s] mssql mysql(v4) nntp oracle-listener oracle-sid pcanywhere pcnfs pop3[s] redis rexec rlogin rpcap rsh rtsp s7-300 sip smb smtp[s] smtp-enum snmp socks5 ssh sshkey teamspeak telnet[s] vmauthd vnc xmpp-v
verbose mode-p
try password-P
load several passwords from FILE-f
exit when a login/pass pair is found per host-e
try n null password, s login as pass and/or r reversed login-b
output format: text(default), json, jsonv1-T
run a number of connects in parallel overall (default: 64)-C
colon separated login:pass format, instead of usernames/passwords files-x
MIN:MAX:CHARSET password bruteforce generation. e.g 5:8:A1 generate passwords from length 5 to 8 with uppercase characters and numbers-V
show login+pass for each attempt-K
do not redo failed attempts (good for servers-to-attack mass scanning)-F
exit when any login/pass pair is found globally-u
loop around users, not passwords (effective! implied with -x)-t
Run a number of connects in parallel per target (default: 16)-r
use a non-random shuffling method for option -x-S
perform an SSL connect-c
wait time per login attempt over all threads (enforces threads-per-target: 1)-w
wait time for a response (default: 32)-y
disable use of symbols in bruteforce-W
wait time between connects per thread (default: 0)