Hydra could compile cleanly on Linux, Windows/Cygwin, Solaris, FreeBSD/.
The THC-Hydra is an excellent tool for researchers and security consultants to show how easy it is to gain unauthorized remote access to the system. Hydra is a parallelized network logon cracker and is used only for legal purposes.
The user has access to Hydra versions for almost all operating systems, besides it is distributed with open source code, which means that any programmer can see how this or that function is implemented and make sure that there are no malicious inclusions in the code before the pentest. The THC-Hydra tool offers flexibility to add new modules to it and works across multiple platforms including Linux, MacOS, Windows. Important: GUI limited to: FTP/RDP/HTTP Auth and HTTP form attacks as i dont needed SSH and all the rest of Hydra features.
If you’re using Ubuntu/Debian, type the following as well: apt-get install libssl-dev libssh-dev libidn11-dev libpcre3-dev \. The tool can utilize a password list, for example, the ‘Rockyou.txt’ password list or create your own. « Hydra-GUI » is a graphical user interface for the windows version of « THC Hydra ». Download THC hydra from Once downloaded, extract the files, and execute the following: cd thc-hydra-master /. Here is a small list of protocols and devices that THC-Hydra can work with: HTTP, FTP, SMTP, POP3, IMAP, MySQL, NCP, NNTP, SOCKS, SSH, XMPP, Cisco and Mikrotik routers, network cameras, Simatic S7-300 controllers and much more. THC-Hydra offers brute force passwords, cracking and can perform rapid dictionary attacks against many protocols. Average brute force attack speed of 900 passwords per second. The program can perform a parallel search on several protocols simultaneously. New modules can be found on the official website of the program, with third-party authors or write it yourself.Īs a database of logins and passwords, the program uses special dictionaries, to improve the probability of successful selection you can specify masks, length and possible symbols, which they can consist of, in addition, there is a possibility to select software-generated passwords using several algorithms. Download THC Hydra Navigate to the directory where Hydra is placed Open CYGWIN and type the command: cd C:hydra-7.3 Next. But its main difference from the programs of this class, in addition to high speed and parallel searches in several threads & mdash it is modularity, you can connect new components that provide support for the latest network devices and protocols. Download and install CYGWIN Linux-like environment for Windows. Turn your firewall and antivirus back on. Close it if you're done, right click your Cygwin shortcut, go into properties and make the start in 'C:\hydra-8.1.tar' and rename it hydra. The Hydra supports more than 50 different protocols and call formats as standard. Type 'make install', wait for 2 or 3 minutes to make sure it stopped. It can also be used to recover forgotten passwords to any resource that uses a login pair and a password to login to the system. THC-Hydra & mdash is one of the fastest and most reliable programs for checking the security and resistance of systems to brute force password recovery.