?
Solved

Hydra

Posted on 2009-07-01
3
Medium Priority
?
289 Views
Last Modified: 2013-12-04
Trying to answer the following Q for an exam:

What does the parameter "-e ns" in the online brute force tool of Hydra do?

HELP!?
0
Comment
Question by:churchhousetrust
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 18

Accepted Solution

by:
simsjrg earned 2000 total points
ID: 24757154
-e ns     additional checks, "n" for null password, "s" try login as pass

Meaning it will try <blank password> and will try the users login as their password.
0
 
LVL 1

Author Comment

by:churchhousetrust
ID: 24757245
so is it:

1.specifies to test each user account with a null password and a password the same as the username.
2. specifies to test for an account with a null username and blank password.
3. specifies to test each password with a blank or null user account as the name.
4. no of above :)
0
 
LVL 18

Assisted Solution

by:simsjrg
simsjrg earned 2000 total points
ID: 24757411
Number 1.

Look at it as a being a password switch.
0

Featured Post

On Demand Webinar: Networking for the Cloud Era

Did you know SD-WANs can improve network connectivity? Check out this webinar to learn how an SD-WAN simplified, one-click tool can help you migrate and manage data in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Make the most of your online learning experience.
A look at what happened in the Verizon cloud breach.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month12 days, 11 hours left to enroll

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question