Name:hydra
Category:Passwords
Publisher:trickest-mhmdiaa
Created:7/14/2023
Container:
quay.io/trickest/thchydra:93abd60-patch-3
Output Type:
License:Unknown
Source:View Source
Parameters
-4
use IPv4 addresses (default)-6
use IPv6 addresses (put always in [] also in servers-to-attack)-s
if the service is on a different default port, define it here-d
debug mode-l
login with login name-q
do not print messages about connection errors-L
load several logins from file
the target: DNS, IP or 192.168.0.0/24 (this OR the servers-to-attack option)-O
use old SSL v2 and v3-M
List of servers to attack, one entry per line, ':' to specify port
the service to crack. Supported: adam6500 asterisk cisco cisco-enable cvs ftp[s] http[s]-{head|get|post} http[s]-{get|post}-form http-proxy http-proxy-urlenum icq imap[s] irc ldap2[s] ldap3[-{cram|digest}md5][s] mssql mysql(v4) nntp oracle-listener oracle-sid pcanywhere pcnfs pop3[s] redis rexec rlogin rpcap rsh rtsp s7-300 sip smb smtp[s] smtp-enum snmp socks5 ssh sshkey teamspeak telnet[s] vmauthd vnc xmpp-v
verbose mode-p
try password-P
load several passwords from FILE-f
exit when a login/pass pair is found per host-e
try n null password, s login as pass and/or r reversed login-b
output format: text(default), json, jsonv1-T
run a number of connects in parallel overall (default: 64)-C
colon separated login:pass format, instead of usernames/passwords files-x
MIN:MAX:CHARSET password bruteforce generation. e.g 5:8:A1 generate passwords from length 5 to 8 with uppercase characters and numbers-V
show login+pass for each attempt-K
do not redo failed attempts (good for servers-to-attack mass scanning)-F
exit when any login/pass pair is found globally-u
loop around users, not passwords (effective! implied with -x)-t
Run a number of connects in parallel per target (default: 16)-r
use a non-random shuffling method for option -x-S
perform an SSL connect-c
wait time per login attempt over all threads (enforces threads-per-target: 1)-w
wait time for a response (default: 32)-y
disable use of symbols in bruteforce-W
wait time between connects per thread (default: 0)