切换风格

Wizard Sky California Sunset glow Black Cloud Beige Dragon Lavender NewYear City Snow Flowers London
收藏本站XSS平台字符串转换jsfuck
198 暴力破解 — THC-Hydra[复制链接]
发表于 2012-10-4 21:16:55 | 显示全部楼层 |!read_mode!
hydra著名黑客组织thc的一款开源的暴力破解工具
安装
  1. root@Dis9Team:~# apt-get install libssl-dev libssh-dev libidn11-dev libpcre3-dev libgtk2.0-dev libmysqlclient-dev libpq-dev libsvn-dev firebird2.1-dev libncp-dev
复制代码

下载源码
  1. root@Dis9Team:/tmp# wget http://www.thc.org/releases/hydra-7.3.tar.gz
  2. root@Dis9Team:/tmp# tar xf hydra-7.3.tar.gz
  3. root@Dis9Team:/tmp# cd hydra-7.3
复制代码

编译
  1. root@Dis9Team:/tmp/hydra-7.3# ./configure --prefix=/pen/passswd/hydra
  2. root@Dis9Team:/tmp/hydra-7.3# make
复制代码

运行
  1. root@Dis9Team:/tmp/hydra-7.3# cd /pen/passswd/hydra/bin/
  2. root@Dis9Team:/pen/passswd/hydra/bin# ls
  3. dpl4hydra.sh  hydra  pw-inspector  xhydra
  4. root@Dis9Team:/pen/passswd/hydra/bin# ./hydra
  5. Hydra v7.3 (c)2012 by van Hauser/THC & David Maciejak - for legal purposes only

  6. Syntax: hydra [[[-l LOGIN|-L FILE] [-p PASS|-P FILE]] | [-C FILE]] [-e nsr] [-o FILE] [-t TASKS] [-M FILE [-T TASKS]] [-w TIME] [-W TIME] [-f] [-s PORT] [-x MIN:MAX:CHARSET] [-SuvV46] [server service [OPT]]|[service://server[:PORT][/OPT]]

  7. Options:
  8.   -R        restore a previous aborted/crashed session
  9.   -S        perform an SSL connect
  10.   -s PORT   if the service is on a different default port, define it here
  11.   -l LOGIN or -L FILE  login with LOGIN name, or load several logins from FILE
  12.   -p PASS  or -P FILE  try password PASS, or load several passwords from FILE
  13.   -x MIN:MAX:CHARSET  password bruteforce generation, type "-x -h" to get help
  14.   -e nsr    try "n" null password, "s" login as pass and/or "r" reversed login
  15.   -u        loop around users, not passwords (effective! implied with -x)
  16.   -C FILE   colon separated "login:pass" format, instead of -L/-P options
  17.   -M FILE   list of servers to be attacked in parallel, one entry per line
  18.   -o FILE   write found login/password pairs to FILE instead of stdout
  19.   -f / -F   exit when a login/pass pair is found (-M: -f per host, -F global)
  20.   -t TASKS  run TASKS number of connects in parallel (per host, default: 16)
  21.   -w / -W TIME  waittime for responses (32s) / between connects per thread
  22.   -4 / -6   prefer IPv4 (default) or IPv6 addresses
  23.   -v / -V   verbose mode / show login+pass combination for each attempt
  24.   -U        service module usage details
  25.   server    the target server (use either this OR the -M option)
  26.   service   the service to crack. Supported protocols: cisco cisco-enable cvs firebird ftp ftps http[s]-{head|get} http[s]-{get|post}-form http-proxy http-proxy-urlenum icq imap[s] irc ldap2[s] ldap3[-{cram|digest}md5][s] mssql mysql ncp nntp oracle-listener oracle-sid pcanywhere pcnfs pop3[s] postgres rdp rexec rlogin rsh sip smb smtp[s] smtp-enum snmp socks5 ssh svn teamspeak telnet[s] vmauthd vnc xmpp
  27.   OPT       some service modules need special input (use -U to see module help)
  28. Use HYDRA_PROXY_HTTP/HYDRA_PROXY and HYDRA_PROXY_AUTH environment for a proxy.

  29. Hydra is a tool to guess/crack valid login/password pairs - usage only allowed
  30. for legal purposes.  Newest version available at http://www.thc.org/thc-hydra
  31. The following services were not compiled in: sapr3 afp oracle.

  32. Examples:
  33.   hydra -l john -p doe 192.168.0.1 ftp
  34.   hydra -L user.txt -p defaultpw -S 192.168.0.1 imap PLAIN
  35.   hydra -l admin -P pass.txt http-proxy://192.168.0.1
  36.   hydra -C defaults.txt -6 pop3s://[fe80::2c:31ff:fe12:ac11]:143/DIGEST-MD5
  37. root@Dis9Team:/pen/passswd/hydra/bin#
复制代码

快捷链接
  1. root@Dis9Team:/pen/passswd/hydra/bin# ln -s /pen/passswd/hydra/bin/hydra /usr/bin/hydra
复制代码

图形模式
  1. root@Dis9Team:/pen/passswd/hydra/bin# ./xhydra
复制代码




附件: 你需要登录才可以下载或查看附件。没有帐号?加入Team
操千曲而后晓声,观千剑而后识器。

代码区

GMT+8, 2020-10-2 06:04

Powered by Discuz! X2

© 2001-2018 Comsenz Inc.

回顶部