GitHub – vanhauser-thc/thc-hydra: hydra

Hydra tool
Parallel and easy login cracker
It is easy to add new units وحدات
This tool allows researchers to show how easy it is
Unauthorized access to the remote system
Supports many attack protocols such as
Cisco AAA, Cisco auth, Cisco enable, CVS, FTP, HTTP(S) -FORM-GET, HTTP(S) -FORM-POST, HTTP(S) -GET, HTTP(S) -HEAD, HTTP- Proxy, ICQ  , IMAP, IRC, LDAP, MS-SQL, MySQL, NNTP, Oracle Listener, Oracle SID, PC-Anywhere, PC-NFS, POP3, PostgreSQL, RDP, Rexec, Rlogin, Rsh, SIP, SMB (NT), SMTP,  SMTP Enum, SNMP v1+v2+v3, SOCKS5, SSH (v1, v2), SSHKEY, Subversion, Teamspeak (TS2), Telnet, VMware-Auth, VNC, XMPP.

It already exists on Kali Linux
Open terminal and type hydra -h

To download for other systems
——— ———– ———— ————–
Some tool keys
-S to make an ssl connection
-s to select services from default ports
-R Restores a previous session that was interrupted
-l for login file
-p for passwords file
-x to enter a strong password
-U server usage details
-u is for users, not passwords
-M List of servers to be attacked
-w to set a waiting time for responses
-t Run the number of tasks of connections in parallel
-f / -F: Exit when the recording is found
(-M: -f per host -f global)
-o: to write the password login data that
Found to instead of file

-t: To run the number of tasks from connections
Parallel (per virtual host: 16)

-4 / -6: IPv4 or IPv6 addresses
-v / -v / -d: verbose mode / show login + pass per attempt / debug mode

Examples of using a specific name hack
# hydra -l hack -p pass.txt ftp

and for a user.txt file
# hydra -l user.txt -p pass.txt ftp

And using the prolonged mode
# hydra -l user.txt -p pass.txt ftp -v

To put the patch
# hydra -l user.txt -p pass.txt ftp -d

Attempt reverse login
# hydra -l user.txt -p pass.txt ftp -e nsr

Attack a specific port instead of the default
Due to security concerns a network administrator can change the port number of a service on another port Hydra performs a brute force attack on the default service port
But you can use -s
To set a specific port number and attack the semaphore port instead of the default port number suppose when checking the target network I found that FTP is running port 2121 instead of 21 so I will execute
The following command for FTP login attack
# hydra -l user.txt -p pass.txt ftp -s 2121

-F you should use
To find valid credentials for any host from within the host list like
# hydra -l user.txt -p pass.txt ftp -M hosts.txt -V -F