mirror of
https://github.com/vanhauser-thc/thc-hydra.git
synced 2025-08-19 13:01:00 -07:00
fixed some typos
This commit is contained in:
parent
3585e505d2
commit
f6bd9d6410
2 changed files with 16 additions and 16 deletions
16
README
16
README
|
@ -23,7 +23,7 @@ access from remote to a system.
|
||||||
|
|
||||||
THIS TOOL IS FOR LEGAL PURPOSES ONLY!
|
THIS TOOL IS FOR LEGAL PURPOSES ONLY!
|
||||||
|
|
||||||
There are already several login hacker tools available, however none does
|
There are already several login hacker tools available, however, none does
|
||||||
either support more than one protocol to attack or support parallized
|
either support more than one protocol to attack or support parallized
|
||||||
connects.
|
connects.
|
||||||
|
|
||||||
|
@ -88,15 +88,15 @@ SAP R/3 and the apple filing protocol - which you will need to download and
|
||||||
install from the vendor's web sites.
|
install from the vendor's web sites.
|
||||||
|
|
||||||
For all other Linux derivates and BSD based systems, use the system
|
For all other Linux derivates and BSD based systems, use the system
|
||||||
software installer and look for similar named libraries like in the
|
software installer and look for similarly named libraries like in the
|
||||||
command above. In all other cases you have to download all source libraries
|
command above. In all other cases, you have to download all source libraries
|
||||||
and compile them manually.
|
and compile them manually.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
SUPPORTED PLATFORMS
|
SUPPORTED PLATFORMS
|
||||||
-------------------
|
-------------------
|
||||||
- All UNIX platforms (Linux, *bsd, Solaris, etc.)
|
- All UNIX platforms (Linux, *BSD, Solaris, etc.)
|
||||||
- MacOS (basically a BSD clone)
|
- MacOS (basically a BSD clone)
|
||||||
- Windows with Cygwin (both IPv4 and IPv6)
|
- Windows with Cygwin (both IPv4 and IPv6)
|
||||||
- Mobile systems based on Linux, MacOS or QNX (e.g. Android, iPhone, Blackberry 10, Zaurus, iPaq)
|
- Mobile systems based on Linux, MacOS or QNX (e.g. Android, iPhone, Blackberry 10, Zaurus, iPaq)
|
||||||
|
@ -113,7 +113,7 @@ Note that NO login/password file is included. Generate them yourself.
|
||||||
A default password list is however present, use "dpl4hydra.sh" to generate
|
A default password list is however present, use "dpl4hydra.sh" to generate
|
||||||
a list.
|
a list.
|
||||||
|
|
||||||
For Linux users, a GTK gui is available, try `./xhydra`
|
For Linux users, a GTK GUI is available, try `./xhydra`
|
||||||
|
|
||||||
For the command line usage, the syntax is as follows:
|
For the command line usage, the syntax is as follows:
|
||||||
For attacking one target or a network, you can use the new "://" style:
|
For attacking one target or a network, you can use the new "://" style:
|
||||||
|
@ -165,7 +165,7 @@ All attacks are then IPv6 only!
|
||||||
If you want to supply your targets via a text file, you can not use the ://
|
If you want to supply your targets via a text file, you can not use the ://
|
||||||
notation but use the old style and just supply the protocol (and module options):
|
notation but use the old style and just supply the protocol (and module options):
|
||||||
hydra [some command line options] -M targets.txt ftp
|
hydra [some command line options] -M targets.txt ftp
|
||||||
You can supply also port for each target entry by adding ":<port>" after a
|
You can supply also the port for each target entry by adding ":<port>" after a
|
||||||
target entry in the file, e.g.:
|
target entry in the file, e.g.:
|
||||||
|
|
||||||
```
|
```
|
||||||
|
@ -290,7 +290,7 @@ When hydra is aborted with Control-C, killed or crashes, it leaves a
|
||||||
"hydra.restore" file behind which contains all necessary information to
|
"hydra.restore" file behind which contains all necessary information to
|
||||||
restore the session. This session file is written every 5 minutes.
|
restore the session. This session file is written every 5 minutes.
|
||||||
NOTE: the hydra.restore file can NOT be copied to a different platform (e.g.
|
NOTE: the hydra.restore file can NOT be copied to a different platform (e.g.
|
||||||
from little endian to big endian, or from solaris to aix)
|
from little endian to big endian, or from Solaris to AIX)
|
||||||
|
|
||||||
HOW TO SCAN/CRACK OVER A PROXY
|
HOW TO SCAN/CRACK OVER A PROXY
|
||||||
------------------------------
|
------------------------------
|
||||||
|
@ -329,7 +329,7 @@ ADDITIONAL HINTS
|
||||||
* uniq your dictionary files! this can save you a lot of time :-)
|
* uniq your dictionary files! this can save you a lot of time :-)
|
||||||
cat words.txt | sort | uniq > dictionary.txt
|
cat words.txt | sort | uniq > dictionary.txt
|
||||||
* if you know that the target is using a password policy (allowing users
|
* if you know that the target is using a password policy (allowing users
|
||||||
only to choose password with a minimum length of 6, containing a least one
|
only to choose a password with a minimum length of 6, containing a least one
|
||||||
letter and one number, etc. use the tool pw-inspector which comes along
|
letter and one number, etc. use the tool pw-inspector which comes along
|
||||||
with the hydra package to reduce the password list:
|
with the hydra package to reduce the password list:
|
||||||
cat dictionary.txt | pw-inspector -m 6 -c 2 -n > passlist.txt
|
cat dictionary.txt | pw-inspector -m 6 -c 2 -n > passlist.txt
|
||||||
|
|
16
README.md
16
README.md
|
@ -23,7 +23,7 @@ access from remote to a system.
|
||||||
|
|
||||||
THIS TOOL IS FOR LEGAL PURPOSES ONLY!
|
THIS TOOL IS FOR LEGAL PURPOSES ONLY!
|
||||||
|
|
||||||
There are already several login hacker tools available, however none does
|
There are already several login hacker tools available, however, none does
|
||||||
either support more than one protocol to attack or support parallized
|
either support more than one protocol to attack or support parallized
|
||||||
connects.
|
connects.
|
||||||
|
|
||||||
|
@ -88,15 +88,15 @@ SAP R/3 and the apple filing protocol - which you will need to download and
|
||||||
install from the vendor's web sites.
|
install from the vendor's web sites.
|
||||||
|
|
||||||
For all other Linux derivates and BSD based systems, use the system
|
For all other Linux derivates and BSD based systems, use the system
|
||||||
software installer and look for similar named libraries like in the
|
software installer and look for similarly named libraries like in the
|
||||||
command above. In all other cases you have to download all source libraries
|
command above. In all other cases, you have to download all source libraries
|
||||||
and compile them manually.
|
and compile them manually.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
SUPPORTED PLATFORMS
|
SUPPORTED PLATFORMS
|
||||||
-------------------
|
-------------------
|
||||||
- All UNIX platforms (Linux, *bsd, Solaris, etc.)
|
- All UNIX platforms (Linux, *BSD, Solaris, etc.)
|
||||||
- MacOS (basically a BSD clone)
|
- MacOS (basically a BSD clone)
|
||||||
- Windows with Cygwin (both IPv4 and IPv6)
|
- Windows with Cygwin (both IPv4 and IPv6)
|
||||||
- Mobile systems based on Linux, MacOS or QNX (e.g. Android, iPhone, Blackberry 10, Zaurus, iPaq)
|
- Mobile systems based on Linux, MacOS or QNX (e.g. Android, iPhone, Blackberry 10, Zaurus, iPaq)
|
||||||
|
@ -113,7 +113,7 @@ Note that NO login/password file is included. Generate them yourself.
|
||||||
A default password list is however present, use "dpl4hydra.sh" to generate
|
A default password list is however present, use "dpl4hydra.sh" to generate
|
||||||
a list.
|
a list.
|
||||||
|
|
||||||
For Linux users, a GTK gui is available, try `./xhydra`
|
For Linux users, a GTK GUI is available, try `./xhydra`
|
||||||
|
|
||||||
For the command line usage, the syntax is as follows:
|
For the command line usage, the syntax is as follows:
|
||||||
For attacking one target or a network, you can use the new "://" style:
|
For attacking one target or a network, you can use the new "://" style:
|
||||||
|
@ -165,7 +165,7 @@ All attacks are then IPv6 only!
|
||||||
If you want to supply your targets via a text file, you can not use the ://
|
If you want to supply your targets via a text file, you can not use the ://
|
||||||
notation but use the old style and just supply the protocol (and module options):
|
notation but use the old style and just supply the protocol (and module options):
|
||||||
hydra [some command line options] -M targets.txt ftp
|
hydra [some command line options] -M targets.txt ftp
|
||||||
You can supply also port for each target entry by adding ":<port>" after a
|
You can supply also the port for each target entry by adding ":<port>" after a
|
||||||
target entry in the file, e.g.:
|
target entry in the file, e.g.:
|
||||||
|
|
||||||
```
|
```
|
||||||
|
@ -290,7 +290,7 @@ When hydra is aborted with Control-C, killed or crashes, it leaves a
|
||||||
"hydra.restore" file behind which contains all necessary information to
|
"hydra.restore" file behind which contains all necessary information to
|
||||||
restore the session. This session file is written every 5 minutes.
|
restore the session. This session file is written every 5 minutes.
|
||||||
NOTE: the hydra.restore file can NOT be copied to a different platform (e.g.
|
NOTE: the hydra.restore file can NOT be copied to a different platform (e.g.
|
||||||
from little endian to big endian, or from solaris to aix)
|
from little endian to big endian, or from Solaris to AIX)
|
||||||
|
|
||||||
HOW TO SCAN/CRACK OVER A PROXY
|
HOW TO SCAN/CRACK OVER A PROXY
|
||||||
------------------------------
|
------------------------------
|
||||||
|
@ -329,7 +329,7 @@ ADDITIONAL HINTS
|
||||||
* uniq your dictionary files! this can save you a lot of time :-)
|
* uniq your dictionary files! this can save you a lot of time :-)
|
||||||
cat words.txt | sort | uniq > dictionary.txt
|
cat words.txt | sort | uniq > dictionary.txt
|
||||||
* if you know that the target is using a password policy (allowing users
|
* if you know that the target is using a password policy (allowing users
|
||||||
only to choose password with a minimum length of 6, containing a least one
|
only to choose a password with a minimum length of 6, containing a least one
|
||||||
letter and one number, etc. use the tool pw-inspector which comes along
|
letter and one number, etc. use the tool pw-inspector which comes along
|
||||||
with the hydra package to reduce the password list:
|
with the hydra package to reduce the password list:
|
||||||
cat dictionary.txt | pw-inspector -m 6 -c 2 -n > passlist.txt
|
cat dictionary.txt | pw-inspector -m 6 -c 2 -n > passlist.txt
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue