To use Hydra for performing a brute-force attack on an FTP service, follow these steps:
1. Prepare Your Username and Password Lists
- Create a text file for usernames (e.g.,
usernames.txt). - Create a text file for passwords (e.g.,
passwords.txt).
2. Basic Command Structure
Use the following command structure to initiate the attack:
hydra -L <username_file> -P <password_file> ftp://<target_ip>
3. Example Command
Here’s an example command to perform an FTP brute-force attack:
hydra -L usernames.txt -P passwords.txt ftp://192.168.1.1
- Replace
usernames.txtwith your actual username file. - Replace
passwords.txtwith your actual password file. - Replace
192.168.1.1with the target FTP server's IP address.
4. Additional Options
You can add options to customize the attack:
- Set Concurrent Tasks: Use
-t <number>to specify the number of concurrent tasks. For example,-t 4for 4 concurrent attempts. - Verbose Output: Use
-vVfor detailed output of the login attempts. - Save Results: Use
-o <file>to save successful logins to a file.
Complete Example Command
hydra -L usernames.txt -P passwords.txt -t 4 -vV ftp://192.168.1.1 -o results.txt
Important Note
Always ensure you have permission to test the target FTP server to avoid legal issues.
If you have more questions or need further assistance, feel free to ask!
