This is how easy it is nowadays to access data on servers, if the system administrator has not taken care of the safety of the data and the security of the server and the network. Such trifles and human inattention and laziness can often lead to sad consequences if such tools end up in the hands of unscrupulous people. You have successfully hacked into the server that is running SSH. Now when you successfully log in, you will see something similar to this. Replace the IP address and username with the ones you found in step 4. To log into the exploited system, enter the following command in the Kali Linux terminal:
Now you have a username and password from the ssh server. Let’s log into the hacked server and see what we can do. You can now break many other protocols with the same method. Just replace the protocol you want to crack. Apart from this you can read the complete introduction of this tool by. Basically it is a GUI version of the Hydra bruteforcing tool and if you want to know about its command line tool you can go here. After the required information is filled in, the panels will look like this:Īfter you have completed step 3, you can launch an attack to break into the SSH service on the server.Ĭlick “Start” and the attack will begin. As you can see, the Linux server succumbed easily, and the passwords are shown below: Hey Folks, in this tutorial we are going to discuss about another tool called X-Hydra. Now you need to fill in all the panels in step 2 with the corresponding information that we collected in step 1. The launch pad is used to start and stop an attack. Settings Panel – This panel is designed to control the number of attempts and the use of proxies during cracking. For example, you can be stealthy using a proxy. In the password panel, select a list of username and password to crack. Be sure to select the last 3 options. These are the possible options: login as password, empty password, and login back. On the target panel, select the target, as well as the service and port number you want to hack. Now you need to fill in the following settings on each panel: Configuring XhydraĮnter xhydra in Kali Linux terminal. The Hydra version will open with a graphical interface as shown. Make sure you replace the IP with your target IP. As you can see, you will get a list of all the services running on the system. In our case, we will “break” the ssh service on port 22 as shown below. Note that you need the service name, port, and IP address of the target for this attack to work.