Quantity a single of the most significant safety holes are passwords, as every single password safety study shows. THC Hydra is a proof of notion code, to give researchers and safety consultants the possibility to show how straightforward it would be to get unauthorized access from remote to a method.

THC Hydra – Bruteforce Attack Tool

At present this tool supports the following protocols:

Asterisk, AFP, Cisco AAA, Cisco auth, Cisco allow, CVS, Firebird, FTP, HTTP-Type-GET, HTTP-Type-POST, HTTP-GET, HTTP-HEAD, HTTP-POST, HTTP-PROXY, HTTPS-Type-GET, HTTPS-Type-POST, HTTPS-GET, HTTPS-HEAD, HTTPS-POST, HTTP-Proxy, ICQ, IMAP, IRC, LDAP, MEMCACHED, MONGODB, MS-SQL, MYSQL, NCP, NNTP, Oracle Listener, Oracle SID, Oracle, Computer-Anyplace, PCNFS, POP3, POSTGRES, RDP, Rexec, Rlogin, Rsh, RTSP, SAP/R3, SIP, SMB, SMTP, SMTP Enum, SNMP v1+v2+v3, SOCKS5, SSH (v1 and v2), SSHKEY, Subversion, Teamspeak (TS2), Telnet, VMware-Auth, VNC and XMPP.

The tool can be utilized on the following platforms:

  • All UNIX platforms (Linux, *BSD, Solaris, and so forth.)
  • MacOS (generally a BSD clone)
  • Windows with Cygwin (each IPv4 and IPv6)
  • Mobile systems primarily based on Linux, MacOS or QNX (e.g. Android, iPhone, Blackberry 10, Zaurus, iPaq)

The user may well automate the attack and run a parallel login to distinctive systems or any of the supported protocols.

You can study far more and download this tool more than right here: https://github.com/vanhauser-thc/thc-hydra

Share