{"id":2604,"date":"2019-10-01T04:41:38","date_gmt":"2019-10-01T04:41:38","guid":{"rendered":"http:\/\/www.incredigeek.com\/home\/?p=2604"},"modified":"2019-10-01T04:41:39","modified_gmt":"2019-10-01T04:41:39","slug":"hydra-ssh-example","status":"publish","type":"post","link":"https:\/\/www.incredigeek.com\/home\/hydra-ssh-example\/","title":{"rendered":"Hydra &#8211; SSH Example"},"content":{"rendered":"\n<p>Hydra is a network login cracker.  You&#8217;ll need a password list and username(s) to get started.<\/p>\n\n\n\n<p><strong>Install Hydra<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">sudo apt-get install -y hydra <\/pre>\n\n\n\n<p><strong>Launch against device<\/strong><br>Change the IP address to the target IP<br>Change ubnt to target Username<br>Change password.lst to your password list file<\/p>\n\n\n\n<p>SSH Example<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">hydra -l ubnt -P password.lst 192.168.1.20 ssh<\/pre>\n\n\n\n<p>Run hydra -h to get the full help.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">Alfred@localhost:~$ hydra -h\nHydra v8.6 (c) 2017 by van Hauser\/THC - Please do not use in military or secret service organizations, or for illegal purposes.\n Syntax: hydra [[[-l LOGIN|-L FILE] [-p PASS|-P FILE]] | [-C FILE]] [-e nsr] [-o FILE] [-t TASKS] [-M FILE [-T TASKS]] [-w TIME] [-W TIME] [-f] [-s PORT] [-x MIN:MAX:CHARSET] [-c TIME] [-ISOuvVd46] [service:\/\/server[:PORT][\/OPT]]\n Options:\n   -R        restore a previous aborted\/crashed session\n   -I        ignore an existing restore file (don't wait 10 seconds)\n   -S        perform an SSL connect\n   -s PORT   if the service is on a different default port, define it here\n   -l LOGIN or -L FILE  login with LOGIN name, or load several logins from FILE\n   -p PASS  or -P FILE  try password PASS, or load several passwords from FILE\n   -x MIN:MAX:CHARSET  password bruteforce generation, type \"-x -h\" to get help\n   -y        disable use of symbols in bruteforce, see above\n   -e nsr    try \"n\" null password, \"s\" login as pass and\/or \"r\" reversed login\n   -u        loop around users, not passwords (effective! implied with -x)\n   -C FILE   colon separated \"login:pass\" format, instead of -L\/-P options\n   -M FILE   list of servers to attack, one entry per line, ':' to specify port\n   -o FILE   write found login\/password pairs to FILE instead of stdout\n   -b FORMAT specify the format for the -o FILE: text(default), json, jsonv1\n   -f \/ -F   exit when a login\/pass pair is found (-M: -f per host, -F global)\n   -t TASKS  run TASKS number of connects in parallel per target (default: 16)\n   -T TASKS  run TASKS connects in parallel overall (for -M, default: 64)\n   -w \/ -W TIME  wait time for a response (32) \/ between connects per thread (0)\n   -c TIME   wait time per login attempt over all threads (enforces -t 1)\n   -4 \/ -6   use IPv4 (default) \/ IPv6 addresses (put always in [] also in -M)\n   -v \/ -V \/ -d  verbose mode \/ show login+pass for each attempt \/ debug mode \n   -O        use old SSL v2 and v3\n   -q        do not print messages about connection errors\n   -U        service module usage details\n   -h        more command line options (COMPLETE HELP)\n   server    the target: DNS, IP or 192.168.0.0\/24 (this OR the -M option)\n   service   the service to crack (see below for supported protocols)\n   OPT       some service modules support additional input (-U for module help)\n Supported services: adam6500 asterisk cisco cisco-enable cvs firebird ftp ftps http[s]-{head|get|post} http[s]-{get|post}-form http-proxy http-proxy-urlenum icq imap[s] irc ldap2[s] ldap3[-{cram|digest}md5][s] mssql mysql nntp oracle-listener oracle-sid pcanywhere pcnfs pop3[s] postgres radmin2 rdp redis rexec rlogin rpcap rsh rtsp s7-300 sip smb smtp[s] smtp-enum snmp socks5 ssh sshkey svn teamspeak telnet[s] vmauthd vnc xmpp\n Hydra is a tool to guess\/crack valid login\/password pairs. Licensed under AGPL\n v3.0. The newest version is always available at http:\/\/www.thc.org\/thc-hydra\n Don't use in military or secret service organizations, or for illegal purposes.\n These services were not compiled in: afp ncp oracle sapr3.\n Use HYDRA_PROXY_HTTP or HYDRA_PROXY environment variables for a proxy setup.\n E.g. % export HYDRA_PROXY=socks5:\/\/l:p@127.0.0.1:9150 (or: socks4:\/\/ connect:\/\/)\n      % export HYDRA_PROXY=connect_and_socks_proxylist.txt  (up to 64 entries)\n      % export HYDRA_PROXY_HTTP=http:\/\/login:pass@proxy:8080\n      % export HYDRA_PROXY_HTTP=proxylist.txt  (up to 64 entries)\n Examples:\n   hydra -l user -P passlist.txt ftp:\/\/192.168.0.1\n   hydra -L userlist.txt -p defaultpw imap:\/\/192.168.0.1\/PLAIN\n   hydra -C defaults.txt -6 pop3s:\/\/[2001:db8::1]:143\/TLS:DIGEST-MD5\n   hydra -l admin -p password ftp:\/\/[192.168.0.0\/24]\/\n   hydra -L logins.txt -P pws.txt -M targets.txt ssh<\/pre>\n","protected":false},"excerpt":{"rendered":"<p>Hydra is a network login cracker. You&#8217;ll need a password list and username(s) to get started. Install Hydra sudo apt-get install -y hydra Launch against deviceChange the IP address to the target IPChange ubnt to target UsernameChange password.lst to your &hellip; <a href=\"https:\/\/www.incredigeek.com\/home\/hydra-ssh-example\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[420],"tags":[727,726,694,200,221,728],"class_list":["post-2604","post","type-post","status-publish","format-standard","hentry","category-hacking","tag-cracking","tag-hydra","tag-network","tag-password","tag-ssh","tag-wordlist"],"_links":{"self":[{"href":"https:\/\/www.incredigeek.com\/home\/wp-json\/wp\/v2\/posts\/2604","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.incredigeek.com\/home\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.incredigeek.com\/home\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.incredigeek.com\/home\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.incredigeek.com\/home\/wp-json\/wp\/v2\/comments?post=2604"}],"version-history":[{"count":2,"href":"https:\/\/www.incredigeek.com\/home\/wp-json\/wp\/v2\/posts\/2604\/revisions"}],"predecessor-version":[{"id":2667,"href":"https:\/\/www.incredigeek.com\/home\/wp-json\/wp\/v2\/posts\/2604\/revisions\/2667"}],"wp:attachment":[{"href":"https:\/\/www.incredigeek.com\/home\/wp-json\/wp\/v2\/media?parent=2604"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.incredigeek.com\/home\/wp-json\/wp\/v2\/categories?post=2604"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.incredigeek.com\/home\/wp-json\/wp\/v2\/tags?post=2604"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}