Brute Forcing Web Forms
Usually used to attack a login form
HTTP Basic Auth
Bruteforce HTTP Basic Auth
Flags:
-V
: verbose mode-f
: exit after the first login pair is found
HTTP POST
Bruteforcing HTTP POST form:
Options:
login_path
: The URL of the login form, e.g/login.php
.form_username_name
: The "name" variable of the username input field of the form.form_password_name
: The "name" variable of the password input field of the form.failed_login_text
: Text which indicates to Hydra that the login failed, for example "Invalid Credentials."username
: The username of the user you want to brute force.
Flags:
-t
: The number of threads.-l
: Specifies the username of the user to brute force.-L
: Specifies a wordlist of usernames to brute force.-P
: Specifies a wordlist of passwords to brute force.
Example use where a failed login redirected to a page with a ?error=1
GET parameter:
WordPress login
Brute forcing WordPress logins using WPScan:
Last updated