Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Using Hydra to scan ip range (Using CLi commands)

Posted on 2013-01-25
2
Medium Priority
?
2,621 Views
Last Modified: 2013-01-28
Hello Experts,


      Is there a way to use Hydra (command line interface) to scana IP range rather than just one IP address at the time… “i.e.  $> Hydra –l  sa  –p  password <IP Address Range>  mssql”  . Does anybody now the Syntax to complete this task….
0
Comment
Question by:Mike
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 65

Accepted Solution

by:
btan earned 2000 total points
ID: 38822033
Saw in (http://www.aldeid.com/wiki/Thc-hydra)  there is an option below

-M <FILE>
server list for parallel attacks, one entry per line

-t <TASKS>
run TASKS number of connects in parallel (default: 16)

Saw there is a GTK version, and with option for  "Target List". This also referring to a file. After selection, the actual CLI  is then display at dialog status bar....

Not user ..
0
 

Author Closing Comment

by:Mike
ID: 38826874
Thanks, that worked.....
0

Featured Post

NFR key for Veeam Agent for Linux

Veeam is happy to provide a free NFR license for one year.  It allows for the non‑production use and valid for five workstations and two servers. Veeam Agent for Linux is a simple backup tool for your Linux installations, both on‑premises and in the public cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

It’s time for spooky stories and consuming way too much sugar, including the many treats we’ve whipped for you in the world of tech. Check it out!
Let's take a look into the basics of ransomware—how it spreads, how it can hurt us, and why a disaster recovery plan is important.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

610 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question