Hydra Tool Complete Tutorial



What is Hydra Tool ?

Hydra Tool is a parallelized login cracker which upholds various conventions to assault. It I pre-introduced in Kali Linux used to lunch savage power or Dictionary assault Aginst username and secret phrase to various administrations like ftp, ssh, telnet, MS-SQL, and so on.


How to Install ?

Install hydra Using apt-get


Update apt database with apt-get using the following command

sudo apt-get update

 

After updating apt database, We can install hydra using apt-get by running the following command: 

sudo apt-get -y install hydra


Install hydra Using apt

Update apt database with apt using the following command.

sudo apt update

 

After updating apt database, We can install hydra using apt by running the following command:

sudo apt -y install hydra

 


 


How to use it ?

Type this in terminal --
sudo hydra -I username -P wordlist.txt A.A.A.A service

Where,

~Username  is the username which you want to hack

~worldlist.txt is text file which contains passwords

~A.A.A.A is IP adress of victim

~Service would be used for login example for ssh 

Example of syntax


sudo hydra -I btc -P worldlist1.txt 10.38.321.21 ssh


Here is full syntax 

hydra [[[-l LOGIN|-L FILE] [-p PASS|-P FILE]] | [-C FILE]] [-e nsr] [-o FILE] [-t TASKS] [-M FILE [-T TASKS]] [-w TIME] [-W TIME] [-f] [-s PORT] [-x MIN:MAX:CHARSET] [-SuvV46] [service://server[:PORT][/OPT]]

-R restore a previous aborted/crashed session

-S perform an SSL connect

-s PORT if the service is on a different default port, define it here

-l LOGIN or -L FILE login with LOGIN name, or load several logins from FILE

-p PASS or -P File try password PASS, or load several passwords from FILE

-x MIN:MAX:CHARSET password bruteforce generation, type “-x -h” to get help

-e nsr try “n” null password, “s” login as pass and/or “r” reversed login

-u loop around users, not passwords (effective! implied with -x)

-C FILE colon separated “login:pass” format, instead of -L/-P options

-M FILE list of servers to be attacked in parallel, one entry per line

-o FILE write found login/password pairs to FILE instead of stdout

-f / -F exit when a login/pass pair is found (-M: -f per host, -F global)

-t TASKS run TASKS number of connects in parallel (per host, default: 16)

-w / -W TIME waittime for responses (32s) / between connects per thread

-4 / -6 prefer IPv4 (default) or IPv6 addresses

-v / -V / -d verbose mode / show login+pass for each attempt / debug mode

-U service module usage details
server the target server (use either this OR the -M option)
service the service to crack (see below for supported protocols)
OPT some service modules support additional input (-U for module help)


If you have any questions please feel free to ask in comment section, we will reply to you as soon as possible.

Post a Comment (0)
Previous Post Next Post