hydra

Hydra is a powerful security tool for password testing and brute-force attacks on multiple protocols. User-friendly interface and versatile capabilities.

Hydra is a powerful and comprehensive security tool designed to help penetration testers and security professionals conduct brute-force attacks on various protocols and applications. The tool is widely used by security researchers and experts worldwide, providing them with the ability to perform testing and analysis on various security protocols, including HTTP, SMTP, FTP, Telnet, and many more.

Hydra is a versatile security tool that can be used for multiple purposes, including testing the strength of passwords, identifying vulnerabilities, and conducting penetration testing on different systems. It allows security professionals to automate their testing processes, which helps them save time and effort while ensuring that they get accurate and reliable results.

One of the primary features of Hydra is its ability to conduct brute-force attacks. This feature enables security professionals to test the strength of passwords by attempting to crack them using various techniques, such as dictionary attacks, which involve testing known words and phrases, and hybrid attacks, which combine multiple attack methods.

Hydra supports multiple protocols and applications, including HTTP, FTP, Telnet, SMTP, POP3, IMAP, SSH, and many more. It also offers a wide range of attack methods, including brute-force attacks, dictionary attacks, and rainbow table attacks, among others. This makes it a versatile tool that can be used to test the security of various systems and applications.

In addition to its powerful attack capabilities, Hydra also features a user-friendly interface that makes it easy to use for both novice and advanced users. The tool also comes with a comprehensive documentation that explains how to use it effectively and efficiently.

Overall, Hydra is an essential tool for any security professional who wants to conduct comprehensive penetration testing on various systems and applications. With its versatile attack capabilities, support for multiple protocols, and user-friendly interface, Hydra is the go-to tool for security professionals who want to ensure that their systems and applications are secure and protected from potential threats.

hydra Usage Example

Attempt to login as the root user (-l root) using a password list (-P /usr/share/wordlists/metasploit/unix_passwords.txt) with 6 threads (-t 6) on the given SSH server (ssh://192.168.1.123):

:~# hydra -l root -P /usr/share/wordlists/metasploit/unix_passwords.txt -t 6 ssh://192.168.1.123
Hydra v7.6 (c)2013 by van Hauser/THC & David Maciejak - for legal purposes only

Hydra (http://www.thc.org/thc-hydra) starting at 2014-05-19 07:53:33
[DATA] 6 tasks, 1 server, 1003 login tries (l:1/p:1003), ~167 tries per task
[DATA] attacking service ssh on port 22

pw-inspector Usage Example

Read in a list of passwords (-i /usr/share/wordlists/nmap.lst) and save to a file (-o /root/passes.txt), selecting passwords of a minimum length of 6 (-m 6) and a maximum length of 10 (-M 10):

:~# pw-inspector -i /usr/share/wordlists/nmap.lst -o /root/passes.txt -m 6 -M 10
:~# wc -l /usr/share/wordlists/nmap.lst
5086 /usr/share/wordlists/nmap.lst
:~# wc -l /root/passes.txt
4490 /root/passes.txt

Packages and Binaries:

hydra

Hydra is a parallelized login cracker which supports numerous protocols to attack. It is very fast and flexible, and new modules are easy to add.

This tool makes it possible for researchers and security consultants to show how easy it would be to gain unauthorized access to a system remotely.

It supports: Cisco AAA, Cisco auth, Cisco enable, CVS, FTP, HTTP(S)-FORM-GET, HTTP(S)-FORM-POST, HTTP(S)-GET, HTTP(S)-HEAD, HTTP-Proxy, ICQ, IMAP, IRC, LDAP, MS-SQL, MySQL, NNTP, Oracle Listener, Oracle SID, PC-Anywhere, PC-NFS, POP3, PostgreSQL, RDP, Rexec, Rlogin, Rsh, SIP, SMB(NT), SMTP, SMTP Enum, SNMP v1+v2+v3, SOCKS5, SSH (v1 and v2), SSHKEY, Subversion, Teamspeak (TS2), Telnet, VMware-Auth, VNC and XMPP.

Installed size: 956 KB How to install: sudo apt install hydra

Dependencies:
  • libapr1

  • libbson-1.0-0

  • libc6

  • libfbclient2

  • libfreerdp2-2

  • libgcrypt20

  • libidn12

  • libmariadb3

  • libmemcached11

  • libmongoc-1.0-0

  • libpcre2-8-0

  • libpq5

  • libssh-4

  • libssl3

  • libsvn1

  • libtinfo6

  • libwinpr2-2

  • zlib1g

dpl4hydra

Generates a (d)efault (p)assword (l)ist as input for THC hydra


hydra

A very fast network logon cracker which supports many different services


hydra-wizard

Wizard to use hydra from command line


pw-inspector

A tool to reduce the password list


hydra-gtk

Hydra is a parallelized login cracker which supports numerous protocols to attack. It is very fast and flexible, and new modules are easy to add.

This tool makes it possible for researchers and security consultants to show how easy it would be to gain unauthorized access to a system remotely.

It supports: Cisco AAA, Cisco auth, Cisco enable, CVS, FTP, HTTP(S)-FORM-GET, HTTP(S)-FORM-POST, HTTP(S)-GET, HTTP(S)-HEAD, HTTP-Proxy, ICQ, IMAP, IRC, LDAP, MS-SQL, MySQL, NNTP, Oracle Listener, Oracle SID, PC-Anywhere, PC-NFS, POP3, PostgreSQL, RDP, Rexec, Rlogin, Rsh, SIP, SMB(NT), SMTP, SMTP Enum, SNMP v1+v2+v3, SOCKS5, SSH (v1 and v2), SSHKEY, Subversion, Teamspeak (TS2), Telnet, VMware-Auth, VNC and XMPP.

This package provides the GTK+ based GUI for hydra.

Installed size: 107 KB How to install: sudo apt install hydra-gtk

Dependencies:
  • hydra

  • libatk1.0-0

  • libc6

  • libgdk-pixbuf-2.0-0

  • libglib2.0-0

  • libgtk2.0-0

xhydra

Gtk+2 frontend for thc-hydra


Updated on: 2022-Nov-16


Last updated

Was this helpful?