Solved

Using Hydra to scan ip range (Using CLi commands)

Posted on 2013-01-25
2
2,071 Views
Last Modified: 2013-01-28
Hello Experts,


      Is there a way to use Hydra (command line interface) to scana IP range rather than just one IP address at the time… “i.e.  $> Hydra –l  sa  –p  password <IP Address Range>  mssql”  . Does anybody now the Syntax to complete this task….
0
Comment
Question by:amstoots
2 Comments
 
LVL 62

Accepted Solution

by:
btan earned 500 total points
ID: 38822033
Saw in (http://www.aldeid.com/wiki/Thc-hydra)  there is an option below

-M <FILE>
server list for parallel attacks, one entry per line

-t <TASKS>
run TASKS number of connects in parallel (default: 16)

Saw there is a GTK version, and with option for  "Target List". This also referring to a file. After selection, the actual CLI  is then display at dialog status bar....

Not user ..
0
 

Author Closing Comment

by:amstoots
ID: 38826874
Thanks, that worked.....
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

An overview of HIPAA and guidance on this topic that Experts Exchange members can offer.
In 2017, ransomware will become so virulent and widespread that if you aren’t a victim yourself, you will know someone who is.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
A simple description of email encryption using a secure portal service. This is one of the choices offered by The Email Laundry for email encryption. The other choices are pdf encryption which creates an encrypted pdf of your email and any attachmen…

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now