1
1
2
2
H Y D R A
3
3
4
- (c) 2001-2018 by van Hauser / THC
4
+ (c) 2001-2019 by van Hauser / THC
5
5
<vh@thc.org> https://github.com/vanhauser-thc/thc-hydra
6
6
many modules were written by David (dot) Maciejak @ gmail (dot) com
7
7
BFG code by Jan Dlabal <dlabaljan@gmail.com>
@@ -23,7 +23,7 @@ access from remote to a system.
23
23
24
24
THIS TOOL IS FOR LEGAL PURPOSES ONLY!
25
25
26
- There are already several login hacker tools available, however none does
26
+ There are already several login hacker tools available, however, none does
27
27
either support more than one protocol to attack or support parallized
28
28
connects.
29
29
@@ -73,30 +73,31 @@ make install
73
73
If you want the ssh module, you have to setup libssh (not libssh2!) on your
74
74
system, get it from http://www.libssh.org, for ssh v1 support you also need
75
75
to add "-DWITH_SSH1=On" option in the cmake command line.
76
+ IMPORTANT: If you compile on MacOS then you must do this - do not install libssh via brew!
76
77
77
78
If you use Ubuntu/Debian, this will install supplementary libraries needed
78
79
for a few optional modules (note that some might not be available on your distribution):
79
80
80
81
```
81
82
apt-get install libssl-dev libssh-dev libidn11-dev libpcre3-dev \
82
83
libgtk2.0-dev libmysqlclient-dev libpq-dev libsvn-dev \
83
- firebird-dev libncp-dev
84
+ firebird-dev
84
85
```
85
86
86
87
This enables all optional modules and features with the exception of Oracle,
87
- SAP R/3 and the apple filing protocol - which you will need to download and
88
+ SAP R/3, NCP and the apple filing protocol - which you will need to download and
88
89
install from the vendor's web sites.
89
90
90
91
For all other Linux derivates and BSD based systems, use the system
91
- software installer and look for similar named libraries like in the
92
- command above. In all other cases you have to download all source libraries
92
+ software installer and look for similarly named libraries like in the
93
+ command above. In all other cases, you have to download all source libraries
93
94
and compile them manually.
94
95
95
96
96
97
97
98
SUPPORTED PLATFORMS
98
99
-------------------
99
- - All UNIX platforms (Linux, *bsd , Solaris, etc.)
100
+ - All UNIX platforms (Linux, *BSD , Solaris, etc.)
100
101
- MacOS (basically a BSD clone)
101
102
- Windows with Cygwin (both IPv4 and IPv6)
102
103
- Mobile systems based on Linux, MacOS or QNX (e.g. Android, iPhone, Blackberry 10, Zaurus, iPaq)
@@ -113,7 +114,7 @@ Note that NO login/password file is included. Generate them yourself.
113
114
A default password list is however present, use "dpl4hydra.sh" to generate
114
115
a list.
115
116
116
- For Linux users, a GTK gui is available, try `./xhydra`
117
+ For Linux users, a GTK GUI is available, try `./xhydra`
117
118
118
119
For the command line usage, the syntax is as follows:
119
120
For attacking one target or a network, you can use the new "://" style:
@@ -165,7 +166,7 @@ All attacks are then IPv6 only!
165
166
If you want to supply your targets via a text file, you can not use the ://
166
167
notation but use the old style and just supply the protocol (and module options):
167
168
hydra [some command line options] -M targets.txt ftp
168
- You can supply also port for each target entry by adding ":<port>" after a
169
+ You can supply also the port for each target entry by adding ":<port>" after a
169
170
target entry in the file, e.g.:
170
171
171
172
```
@@ -290,7 +291,7 @@ When hydra is aborted with Control-C, killed or crashes, it leaves a
290
291
"hydra.restore" file behind which contains all necessary information to
291
292
restore the session. This session file is written every 5 minutes.
292
293
NOTE: the hydra.restore file can NOT be copied to a different platform (e.g.
293
- from little endian to big endian, or from solaris to aix )
294
+ from little endian to big endian, or from Solaris to AIX )
294
295
295
296
HOW TO SCAN/CRACK OVER A PROXY
296
297
------------------------------
@@ -329,7 +330,7 @@ ADDITIONAL HINTS
329
330
* uniq your dictionary files! this can save you a lot of time :-)
330
331
cat words.txt | sort | uniq > dictionary.txt
331
332
* if you know that the target is using a password policy (allowing users
332
- only to choose password with a minimum length of 6, containing a least one
333
+ only to choose a password with a minimum length of 6, containing a least one
333
334
letter and one number, etc. use the tool pw-inspector which comes along
334
335
with the hydra package to reduce the password list:
335
336
cat dictionary.txt | pw-inspector -m 6 -c 2 -n > passlist.txt
@@ -377,7 +378,7 @@ Version 1.00 example:
377
378
"These are very free form"
378
379
],
379
380
"generator": {
380
- "built": "2018-01 -01 14:44:22",
381
+ "built": "2019-03 -01 14:44:22",
381
382
"commandline": "hydra -b jsonv1 -o results.json ... ...",
382
383
"jsonoutputversion": "1.00",
383
384
"server": "127.0.0.1",
@@ -526,4 +527,4 @@ zlGuZP1S6Y7S13ytiULSzTfUxJmyGYgNo+4ygh0i6Dudf9NLmV+i9aEIbLbd6bni
526
527
zB3yrr+vYBT0uDWmxwPjiJs=
527
528
=ytEf
528
529
-----END PGP PUBLIC KEY BLOCK-----
529
- ```
530
+ ```
0 commit comments