Quantity a single of the most significant safety holes are passwords, as every single password safety study shows. THC Hydra is a proof of notion code, to give researchers and safety consultants the possibility to show how straightforward it would be to get unauthorized access from remote to a method.
At present this tool supports the following protocols:
Asterisk, AFP, Cisco AAA, Cisco auth, Cisco allow, CVS, Firebird, FTP, HTTP-Type-GET, HTTP-Type-POST, HTTP-GET, HTTP-HEAD, HTTP-POST, HTTP-PROXY, HTTPS-Type-GET, HTTPS-Type-POST, HTTPS-GET, HTTPS-HEAD, HTTPS-POST, HTTP-Proxy, ICQ, IMAP, IRC, LDAP, MEMCACHED, MONGODB, MS-SQL, MYSQL, NCP, NNTP, Oracle Listener, Oracle SID, Oracle, Computer-Anyplace, PCNFS, POP3, POSTGRES, RDP, Rexec, Rlogin, Rsh, RTSP, SAP/R3, SIP, SMB, SMTP, SMTP Enum, SNMP v1+v2+v3, SOCKS5, SSH (v1 and v2), SSHKEY, Subversion, Teamspeak (TS2), Telnet, VMware-Auth, VNC and XMPP.
The tool can be utilized on the following platforms:
- All UNIX platforms (Linux, *BSD, Solaris, and so forth.)
- MacOS (generally a BSD clone)
- Windows with Cygwin (each IPv4 and IPv6)
- Mobile systems primarily based on Linux, MacOS or QNX (e.g. Android, iPhone, Blackberry 10, Zaurus, iPaq)
The user may well automate the attack and run a parallel login to distinctive systems or any of the supported protocols.
You can study far more and download this tool more than right here: https://github.com/vanhauser-thc/thc-hydra