168
◾
Ethical Hacking and Penetration Testing Guide
authentication, because there are better tools for it, which we will discuss in the “Web Hacking”
chapter (Chapter 12).
Basic Syntax for Hydra
Hydra comes preloaded with a username/password list. We can predefine a username or a user-
name list; the choice is ours.
Alternatively, we can use our own custom password list to increase
the chances of success. The very first choice would be to use top 100 or 1000 worsed passwords.
A collection of good passwords list can be found at packetstorm (http://packetstormsecurity.com/
Crackers/wordlists/). Here is the basic syntax for hydra to brute-force a service.
Dostları ilə paylaş: