Nieuws:

Welkom, Gast. Alsjeblieft inloggen of registreren.
Heb je de activerings-mail niet ontvangen?

Auteur Topic: Problemen gebruik HYDRA - 5.4 op ubuntu 10.04 (Lucid)  (gelezen 702 keer)

Problemen gebruik HYDRA - 5.4 op ubuntu 10.04 (Lucid)
« Gepost op: 2010/08/24, 10:29:07 »
Ik probeer met het programma Hydra 5.4 in Ubuntu 10.04 het wachtwoord te achterhalen van een ftp server. De server zit in hetzelfde netwerk als de computer die de opdracht uitvoert. Na verschillende negatieve pogingen en enkele foutmeldingen roep ik graag de hulp in van derden. Hieronder de uitgevoerde commando 's :

accountnaam@ubuntu:~/bin/hydra-5.4-src$ hydra -l flipper -P password.lst domain.com                      (input)
hydra: command not found                (output)

accountnaam@ubuntu:~/bin/hydra-5.4-src$ ./hydra -l flipper -P password.lst domain.com                      (input)
hydra: command not found                (output)

Hydra 5.4 geeft de volgende syntaxis en commando 's bij de manual:

Hydra v5.4 [http://www.thc.org] (c) 2006 by van Hauser / THC <vh@thc.org>

Syntax: ./hydra [[[-l LOGIN|-L FILE] [-p PASS|-P FILE]] | [-C FILE]] [-e ns]
 [-o FILE] [-t TASKS] [-M FILE [-T TASKS]] [-w TIME] [-f] [-s PORT] [-S] [-vV]
 server service [OPT]

Options:
  -R        restore a previous aborted/crashed session
  -S        connect via SSL
  -s PORT   if the service is on a different default port, define it here
  -l LOGIN or -L FILE login with LOGIN name, or load several logins from FILE
  -p PASS  or -P FILE try password PASS, or load several passwords from FILE
  -e ns     additional checks, "n" for null password, "s" try login as pass
  -C FILE   colon seperated "login:pass" format, instead of -L/-P options
  -M FILE   server list for parallel attacks, one entry per line
  -o FILE   write found login/password pairs to FILE instead of stdout
  -f        exit after the first found login/password pair (per host if -M)
  -t TASKS  run TASKS number of connects in parallel (default: 16)
  -w TIME   defines the max wait time in seconds for responses (default: 30)
  -v / -V   verbose mode / show login+pass combination for each attempt
  server    the target server (use either this OR the -M option)
  service   the service to crack. Supported protocols: telnet ftp pop3[-ntlm]   imap[-ntlm] smb smbnt http-{head|get} http-{get|post}-form http-proxy cisco  cisco-enable vnc ldap2 ldap3 mssql mysql oracle-listener postgres nntp socks5   rexec rlogin pcnfs snmp rsh cvs svn icq sapr3 ssh2 smtp-auth[-ntlm] pcanywhere  teamspeak sip vmauthd
  OPT       some service modules need special input (see README!)


Dank bij voorbaat,

Mvg