Once these have been filled in, the rest is easy. The location of the password file is inputted in the box called “password list”. ![]() For instance, in the “username list”, I would put “/home/kalyani/usernamelist.txt”. In the next tab, input the username you desire or a list of usernames (the location of the list of usernames in this case). The plus point about Hydra is that it can deal with a large number of protocols. The “be verbose” box is equivalent to -v in THC Hydra, while the “show attempts” box is equivalent to -V in THC Hydra. It would be advisable to tick the “be verbose” and the “show attempts” boxes as well. In the target box, you’d put 999.999.999.999, and in the port section, you’d put 22. Suppose you’re attacking a single target, an SSH, located at 999.999.999.999 (a fake IP address, obviously). ![]() ![]() Username: either input a username or a list of usernamesĭepending on whether you want to hack one or multiple targets, you can either input one or many targets into the target box.Port number: the port number associated with the protocol.A target or list of targets: This is the IP address of the protocol you wish to attack.Once installed, you will need the following:
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |