Remote Exploitation
◾
169
The command is very simple. We have specified the username as “administrator” followed by
the –P parameter and the location where the wordlist is located. In BackTrack,
the default list is
located in the
/pentest/passwords/wordlist/
directory.
Notice that hydra has managed to find the password: “aedis”. While performing this brute
force attack, a huge traffic was noticed on the server end, and from the ftp logs, we could see hydra
in action, where it has left a huge log of presence. These brute force attacks are not recommended.
Now that we know the username and the
password for the ftp server, we can try logging in.
Type in “ftp” followed by the server name. It will ask for username and password. After entering
it, we will be able to log in to the FTP server, where we can issue further commands.
In
a similar manner, we can use Hydra to brute-force other services such as SSH, SMB,
and RDP. The method for cracking a webform is a bit different; however, there are much better
tools to do it than Hydra, which we will discuss when we reach the “Web Hacking chapter”
(Chapter 12).