any luck using Hydra?
Results 1 to 4 of 4

Thread: any luck using Hydra?

  1. #1
    Join Date
    Oct 2006

    any luck using Hydra?

    guys I was giving Hydra a try, because is listed as the top 10 password crackers at, behind cain, and john, but so far no luck unlike cain that uses MITM attack, Hydra launches a brute force using dictionary attack, and has a variety of use like choosing desire service, port, target...etc, but so far every time I use it I get a bunch of errors coming back, it does not even launches the attack or stablish connection..........has anybody used it before? and with success
    here is the output I get:

    ** (xhydra:14224): WARNING **: callbacks.c 529: popen_rw_unbuffered: execv() returned

    ** (xhydra:14224): WARNING **: /usr/local/bin/hydra

    ** (xhydra:14224): WARNING **:

    ** (xhydra:14224): WARNING **: ftp

    ** (xhydra:14224): WARNING **: -l

    ** (xhydra:14224): WARNING **: administrator

    ** (xhydra:14224): WARNING **: -P

    ** (xhydra:14224): WARNING **: /media/hd2/dictionaries/password.txt

    ** (xhydra:14224): WARNING **: -e

    ** (xhydra:14224): WARNING **: ns

    ** (xhydra:14224): WARNING **: -t

    ** (xhydra:14224): WARNING **: 36

    ** ERROR **: file callbacks.c: line 544 (popen_re_unbuffered): should not be reached

  2. #2
    Senior Member nihil's Avatar
    Join Date
    Jul 2003
    United Kingdom: Bridlington
    Please do not submit a post more than once......... you will only trigger anti-spamming mechanisms

    I don't care what your ISP is overcharging you for, like mine, it doesn't always deliver, so please be patient and wait 60 minutes

    EDIT: You need to give more details about the environment you are attempting to use Hydra in............. we have some very good people here, but none of them can give me the winning lottery numbers

    And welcome to AO............... I bite, but I don't know about the others............
    Last edited by nihil; February 18th, 2007 at 10:29 AM.

  3. #3
    Join Date
    Oct 2006
    is a very simple test environment, basically Im using my nix box and testing hydra against a w2k3 machine, that is patched, I do not know if that is the reason why I keep getting the reject connection, because I've never used it before, I have tried brutus a couple of times, but like any bruteforce remote login password cracker it leaves too many traces behind on the log.........although brutus seems to work better at least establish a connection and launches the attack regardless the service, not the case with hydra

  4. #4
    Senior Member gore's Avatar
    Join Date
    Oct 2002
    Hydra does more than crack passwords. Also, if you're getting connection rejected on a server OS that's patched, I'd say that's kind of normal if it has a firewall going, but if it doesn't, I'm not sure as my use of Windows Server 2003 is limited at best.

    Try this though from your shell:

    man hydra

    The docs aren't that bad and the info on hydra on their website is decent enough to where it isn't terribly boring so just read up on it more.

    Another thing you may find useful is IPSorcery and or Hping. They don't crack passwords but you can make your own packets.

Similar Threads

  1. Hydra
    By gore in forum *nix Security Discussions
    Replies: 3
    Last Post: May 24th, 2006, 10:46 PM
  2. Hydra Compilation Issues...
    By burningion in forum IDS & Scanner Discussions
    Replies: 2
    Last Post: March 18th, 2006, 02:27 AM
  3. problem compiling hydra
    By mr-unix in forum *nix Security Discussions
    Replies: 4
    Last Post: February 22nd, 2006, 03:41 PM
  4. Hydra for cracking Cisco enable passwords
    By Trench_Rot in forum Network Security Discussions
    Replies: 3
    Last Post: May 15th, 2005, 02:48 PM
  5. Hack the Hydra Web Server and get 100 Gran!!!
    By P4XEON in forum Network Security Discussions
    Replies: 2
    Last Post: March 13th, 2002, 11:26 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts