Solved

Using Hydra to scan ip range (Using CLi commands)

Posted on 2013-01-25
2
2,128 Views
Last Modified: 2013-01-28
Hello Experts,


      Is there a way to use Hydra (command line interface) to scana IP range rather than just one IP address at the time… “i.e.  $> Hydra –l  sa  –p  password <IP Address Range>  mssql”  . Does anybody now the Syntax to complete this task….
0
Comment
Question by:amstoots
2 Comments
 
LVL 62

Accepted Solution

by:
btan earned 500 total points
ID: 38822033
Saw in (http://www.aldeid.com/wiki/Thc-hydra)  there is an option below

-M <FILE>
server list for parallel attacks, one entry per line

-t <TASKS>
run TASKS number of connects in parallel (default: 16)

Saw there is a GTK version, and with option for  "Target List". This also referring to a file. After selection, the actual CLI  is then display at dialog status bar....

Not user ..
0
 

Author Closing Comment

by:amstoots
ID: 38826874
Thanks, that worked.....
0

Featured Post

Master Your Team's Linux and Cloud Stack

Come see why top tech companies like Mailchimp and Media Temple use Linux Academy to build their employee training programs.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

With healthcare moving into the digital age with things like Healthcare.gov, the digitization of patient records and video conferencing with patients, data has a much greater chance of being exposed than ever before.
Each year, investment in cloud platforms grows more than 20% (https://www.immun.io/hubfs/Immunio_2016/Content/Marketing/Cloud-Security-Report-2016.pdf?submissionGuid=a8d80a00-6fee-4b85-81db-a4e28f681762) as an increasing number of companies begin to…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question