Man page of HYDRA
HYDRA
Section: User Commands (1)
Updated: 30/01/2011
Index of this MAN page
Back To MAN Pages From BackTrack 5 R1 Master List
NAME
hydra - A very fast network logon cracker which support many different services
SYNOPSIS
hydra
[[[-l LOGIN|-L FILE] [-p PASS|-P FILE]] | [-C FILE]] [-e ns] [-4/6]
[-o FILE] [-t TASKS] [-M FILE [-T TASKS]] [-w TIME] [-f] [-s PORT] [-S] [-vV]
server service [OPT]
DESCRIPTION
Hydra is a parallized login cracker which supports numerous protocols
to attack. New modules are easy to add, beside that, it is flexible and
very fast.
This tool gives researchers and security consultants the possiblity to
show how easy it would be to gain unauthorized access from remote to a
system.
Currently this tool supports:
AFP, Cisco AAA, Cisco auth, Cisco enable, CVS, Firebird, FTP, HTTP-FORM-GET,
HTTP-FORM-POST, HTTP-GET, HTTP-HEAD, HTTP-PROXY, HTTPS-FORM-GET, HTTPS-FORM-POST,
HTTPS-GET, HTTPS-HEAD, ICQ, IMAP, IRC, LDAP, MS-SQL, MYSQL, NCP, NNTP, PCNFS, POP3,
POSTGRES, REXEC, SAP/R3, SMB, SMTP, SNMP, SOCKS5, SSH(v1 and v2),
Subversion, Teamspeak (TS2), TELNET, VMware-Auth, VNC and XMPP.
- -R
-
restore a previous aborted/crashed session
- -S
-
connect via SSL
- -s PORT
-
if the service is on a different default port, define it here
- -l LOGIN
-
or -L FILE login with LOGIN name, or load several logins from FILE
- -p PASS
-
or -P FILE try password PASS, or load several passwords from FILE
- -e ns
-
additional checks, "n" for null password, "s" try login as pass
- -c FILE
-
colon separated "login:pass" format, instead of -L/-P options
- -m FILE
-
server list for parallel attacks, one entry per line
- -o FILE
-
write found login/password pairs to FILE instead of stdout
- -f
-
exit after the first found login/password pair (per host if -M)
- -t TASKS
-
run TASKS number of connects in parallel (default: 16)
- -w TIME
-
defines the max wait time in seconds for responses (default: 30)
- -4 / -6
-
prefer IPv4 (default) or IPv6 addresses
- -v / -V
-
verbose mode / show login+pass combination for each attempt
- server
-
the target server (use either this OR the -M option)
- service
-
the service to crack. Supported protocols: afp cisco cisco-enable cvs firebird ftp[s] http[s]-{head|get} http[s]-{get|post}-form http-proxy icq irc imap ldap2 ldap3[-{cram|digest}md5] mssql mysql ncp nntp oracle oracle-listener oracle-sid pcnfs pop3 pcanywhere postgres rexec rlogin rsh sapr3 sip smb smtp smtp-enum snmp socks5 ssh svn teamspeak telnet vnc vmauthd xmpp
- OPT
-
some service modules need special input (see README!)
- -h, --help
-
Show summary of options.
SEE ALSO
xhydra(1),
pw-inspector(1).
The programs are documented fully by van Hauser <vh@thc.org>
AUTHOR
hydra was written by van Hauser / THC <vh@thc.org> and co-maintained by David Maciejak <david.maciejak@gmail.com>.
This manual page was written by Daniel Echeverry <epsilon77@gmail.com>,
for the Debian project (and may be used by others).
Index
- NAME
-
- SYNOPSIS
-
- DESCRIPTION
-
- SEE ALSO
-
- AUTHOR
-
This document was created by
man2html,
using the manual pages.
Time: 07:34:21 GMT, September 13, 2011
Printable version of this article