hydra Chinese Documents

hydra (Hydra) is an open source protocol blasting tool is very powerful! ! !

Specific use are as follows:

-R continue to progress from a crack on then

-I have been ignored crack crack file

-S use SSL link

-s specify a non-default port service port

-l username Specifies the user name to crack

-L username Specifies the user name dictionary file

-p password Specifies the password cracking

-P password specifies the password dictionary file

No symbol -y blasting

-e nsr "n" attempts to empty password, "s" attempt to specify a password, "r" reverse Login

-C colon split the file format, such as "login: password" instead of -L / -P parameter

-M file per line of attack server list, with ":( colon)" designated port

-o file specifies the resulting output file

-b -o format specifies the output format for the output file, the default is: text, json, jsonv1

Stop crack when -f / -F find the login name and password (if a file, the next IP hack is carried out)

-T thread sets the number of threads running, the default is 16

-w / -W timeout time set the maximum time, in seconds, the default is 30s

-c each time to wait for all threads of time to crack

-4 / -6 using IPv4 (default) or IPv6

-v / -V show detailed procedures

-q Do not print information connection failure

-U service module detailed usage

-h command-line parameters introduced more

server target server: DNS, IP or 192.168.0.0/24 (this option or -M option)

Service service to crack the service (see below for supported protocols)

OPT choose some service module supports additional input (-U represent a module help)

支持的协议:
adam6500、asterisk、cisco、cisco-enable、cvs、firebird、ftp、ftps、http[s]-{head|get|post}、http[s]-{get|post}-form、http-proxy、http-proxy-urlenum、icq、imap[s]、irc、ldap2[s]、ldap3[-{cram|digest}md5][s]、mssql、mysql、nntp、oracle-listener、oracle-sid、pcanywhere、pcnfs、pop3[s]、postgres、radmin2、rdp、redis、rexec、rlogin、rpcap、rsh、rtsp、s7-300、sip、smb、smtp[s]、smtp-enum、snmp、socks5、ssh、sshkey、svn、teamspeak、telnet[s]、vmauthd、vnc、xmpp


 

Guess you like

Origin www.cnblogs.com/Excellent-person/p/11004998.html