0xnhl

Back

Hydra

Created: 1/12/2026 Updated: 1/12/2026
#cybersec/tools

Used for Bruteforce attacks

  • Hydra is a tool that is used to guess and crack credentials.
  • Hydra is typically used to interact with a victim server (for example, web server, FTP server, SSH server, file server) and try a list of username/password combinations.
Basic usage
plaintext

hydra -l [user | root] -P [wordlist (/usr/share/wordlists/metasploit/unix_passwords.txt)] [uri (ssh://192.168.57.25:22)] -t [no of threads (4)] -V

plaintext
 -l LOGIN or -L FILE login with LOGIN name, or load several logins from FILE
 -p PASS or -P FILE try password PASS, or load several passwords from FILE
 -C FILE    colon separated "login:pass" format, instead of -L/-P options
 -M FILE    list of servers to attack, one entry per line, ':' to specify port
 -t TASKS   run TASKS number of connects in parallel per target (default: 16)
 -U         service module usage details
plaintext
  • For example, say you know that an FTP user’s username is omar. You can then try a file that contains a list of passwords against an FTP server (10.1.2.3). To accomplish this, you use the following command: hydra -l omar -P passwords.txt ftp://10.1.2.3

We can also use metaspoit for bruteforcing ssh