✔️ Assess password policies via network services
✔️ Gain access to network services
✔️ Gain access to web applications
we can use similar approach as password-file cracking on network authentications such as:
we can use both attacks against a network authentication
why is brute force impractical?
Online vs Offline Brute Force attacks:
time to test password offline (JtR) → processing time
over a network, time to test passwords depends on:
That's why network authentication attacks practically depend on → dictionary attacks
use common default usernames and passwords
Fast, parallelized, network authentication cracker that supports different protocols
can attack ~50 different service types
✅dictionary attacks
✅bruteforce attacks
Hydra architecture is based on modules
A module is a piece of code that let's Hydra attack a specific protocol