🛠️
Hacking tools
  • Welcome!
  • Nmap
    • Nmap - Intro
    • Commands
    • Nmap Switches
    • Nmap Scripting Engine
  • Metasploit
    • Metasploit - Intro
    • Metasploit Framework Console
    • Msfvenom
    • Meterpreter
  • Netcat
    • Netcat - Intro
    • Netcat - Advanced
  • John the Ripper
    • John the Ripper - Intro
    • John the Ripper - Commands
  • Web Directory Fuzzers
    • Gobuster
    • Ffuf
  • Hydra
    • Hydra - Intro
    • Hydra - Commands
  • SQLMap
Powered by GitBook
On this page
  • Introduction
  • Protocols List
  1. Hydra

Hydra - Intro

PreviousFfufNextHydra - Commands

Last updated 8 months ago

Introduction

Hydra is a powerful and versatile network login cracker designed for brute-forcing passwords on various services. It supports a wide range of network protocols, including HTTP, FTP, SSH, Telnet, SMB, and many others. Hydra works by attempting multiple username and password combinations against a target service until it finds a match.

Protocols List

These are the list of protocols that hydra has the ability to brute-force:

  • Asterisk

  • AFP

  • Cisco AAA

  • Cisco auth

  • Cisco enable

  • CVS

  • Firebird

  • FTP

  • HTTP-FORM-GET

  • HTTP-FORM-POST

  • HTTP-GET

  • HTTP-HEAD

  • HTTP-POST

  • HTTP-PROXY

  • HTTPS-FORM-GET

  • HTTPS-FORM-POST

  • HTTPS-GET

  • HTTPS-HEAD

  • HTTPS-POST

  • HTTP-Proxy

  • ICQ

  • IMAP

  • IRC

  • LDAP

  • MEMCACHED

  • MONGODB

  • MS-SQL

  • MYSQL

  • NCP

  • NNTP

  • Oracle Listener

  • Oracle SID

  • Oracle

  • PC-Anywhere

  • PCNFS

  • POP3

  • POSTGRES

  • Radmin

  • RDP

  • Rexec

  • Rlogin

  • Rsh

  • RTSP

  • SAP/R3

  • SIP

  • SMB

  • SMTP

  • SMTP Enum

  • SNMP v1+v2+v3

  • SOCKS5

  • SSH (v1 and v2)

  • SSHKEY

  • Subversion

  • TeamSpeak (TS2)

  • Telnet

  • VMware-Auth

  • VNC

  • XMPP

This can be found in the .

official repository
THC-Hydra