Use hydra- blasting tools

About 0x01

hydra is a protocol supported by many of blasting tools, integrated in kali, but can also be downloaded to run on windows;

source code on GitHub:  https://github.com/vanhauser-thc/thc-hydra

Supported protocols:

adam6500、asterisk、cisco、cisco-enable、cvs、firebird、ftp、ftps、http[s]-{head|get|post}、
http[s]-{get|post}-form、http-proxy、http-proxy-urlenum、icq、imap[s]、irc、ldap2[s]、
ldap3[-{cram|digest}md5][s]、mssql、mysql、nntp、oracle-listener、oracle-sid、pcanywhere、
pcnfs、pop3[s]、postgres、radmin2、rdp、redis、rexec、rlogin、rpcap、rsh、rtsp、s7-300、sip、smb、
smtp[s]、smtp-enum、snmp、socks5、ssh、sshkey、svn、teamspeak、telnet[s]、vmauthd、vnc、xmpp

This tool can be seen blasting involved widely used.

Use 0x02

Use hdra -h parameter to view its options

 

 

Parameter Use
 - L specifies a single user name, known for use in blasting Username Password User Name
 - L specifies a plurality of user name, the file path parameter values stored in the user name
 - P specify a single password for the user to know the password Blasting when using the name
 - P specify multiple passwords, the parameter value stored password file (usually called a dictionary) path
 -C use this parameter when a user name and password stored in a file. Note that the file (dictionary) must be stored in the format " username: password " format.
-M specify multiple targets, this parameter is stored in the target path of the file (absolute path is recommended). Note: The list of file storage format must " address: port " 
- the number of tasks at t specify blasting (can be understood as the number of threads), the default is 16
 - S designated port for non-targeted port by default. For example: http service uses port 80.
 - use SSL link when blasting designated S
 - continue blasting on a blast from R to continue on schedule
 - v displays the details of blasting
 -f blasting a success but a stop blasting

Blasting any agreement on the choice of what protocol module

Commonly used blasting statement:

1 , crack SSH: 
Hydra the -l username -p password dictionary -t thread -vV - E ns ip SSH 
Hydra the -l username -p password dictionary -t thread save.log -o - vV ip SSH 

2 , crack ftp: 
ip the FTP Hydra the -l username -P password dictionary -t thread (default 16) - vV 
Hydra ip the FTP the -l username -P password dictionary ns -e - vV 

3 , submitted to get way, crack web login: 
Hydra the -l user Dictionary name -p password -e -t ns ip http- thread -vV GET / ADMIN /  
Hydra the -l username -p password dictionary ns -e -f -t thread ip http- -vV GET / ADMIN / index.php 

4 submitted post way, break the web login: 
Hydra the -l username -P password dictionary -s 80 ip HTTP-post-form "password /admin/login.php:username=^USER^&password=^PASS^&submit=login:sorry "  
Hydra -t 3 the -l ADMIN -P pass.txt -o OUT .txt -f 10.36 . 16.18 HTTP-post- form " the login.php: the uSER ID = ^ = ^ & ^ the passwd the PASS ^: <title> Wrong username or password </ title> "  
(parameters: -t while the number of threads 3, -l username is admin, dictionary pass. txt, saved as out.txt, -f when to crack a code to stop, 10.36 . 16 .18 target ip, http-post-form represents a break is the use of the form http password post submission crack, <title> of content is a wrong guess returns information prompt solution of). 

5 , crack HTTPS: 
Hydra -m /index.php the -l -P pass.txt MutS 10.36 . 16.18 https 

6, Crack TeamSpeak: 
Hydra the -l username -P password dictionary -s port number - vV ip TeamSpeak 

7 , crack the Cisco: 
Hydra -P pass.txt 10.36 . 16.18 the Cisco 
Hydra -m Cloud -P pass.txt 10.36 . 16.18 Cisco- enable 

. 8 , cracks SMB: 
Hydra -l Administrator -P pass.txt 10.36 . 16.18 SMB 

. 9 , cracks POP3: 
Hydra -l MutS - P pass.txt my.pop3.mail POP3 

10 , cracks RDP: 
Hydra IP RDP -l Administrator pass.txt -P - V 

11 , cracked http-proxy: 
hydra -l admin -P pass.txt http-proxy://10.36.16.18 

12、破解imap: 
hydra -L user.txt -p secret 10.36.16.18 imap PLAIN 
hydra -C defaults.txt -6 imap://[fe80::2c:31ff:fe12:ac11]:143/PLAIN

Note: number of threads blasting using ssh  4~ 7 a, since the limited number of connections ssh defined.

 

Guess you like

Origin www.cnblogs.com/-chenxs/p/12333625.html