🍡Using Hydra

The first command given to break down was "hydra -l <username> -p <full path to pass> MACHINE_IP -t 4 ssh"

The following table shows which option does what.

option
description

-l

username

-p

list of passwords

-t

specifies the numer of threads

The next command, "hydra -l <username> -P <wordlist> MACHINE_IP http-post-form "/:username=^USER^password=^PASS^:F=incorrect" -V

The following table breaks each part in this command down.

option
description

-l

single username

-p

indicator to use the password list

http-post-form

indicates the type of form

/login url

login page url

:username

form field to enter the username

^USER^

tells hydra to use the username

password

form field where the password is entered

^PASS^

uses password list supplied prior

Login

login failed message indicator

Login failed

login failure message

F=incorrect

if it appears on the page, its incorrect

-V

verborse output

Using the commands we learned, we are instructed to use Hydra to find Molly's passwords.

The first thing I did was go through my usr/share/wordlists folder to find my available wordlists that were already preinstalled. The one I ended up using for this exercise was rockyou.txt.

Using the command, "hydra -l molly -P /usr/share/wordlists/rockyou.txt 10.10.100.155 http-post-form "/login:username=^USER^password=^PASS^:incorrect" -V" I used Hydra to brute force molly's password.

Going back to the web server available on this IP, I used the credentials given to login and capture the first flag.

To find Molly's ssh password, I used the command, "hydra -l molly -P /usr/share/wordlists/rockyou.txt".

Using these credentials, I was able to login to molly's system.

From here, I was able to search around the directories to find the flag.

Using "ls" to list the files in the current directory and then using "cat" to read the file found, I was able to find the second flag.

Last updated