THC-Hydra & mdash; Its features include brute force password recovery for checking the security and resistance of systems. any resource where the user must enter a login pair and a password to get in to the system after forgotten passwords are recovered.
The Hydra supports more than 50 different protocols and call formats as standard. But its main difference from the programs of this class, in addition to high speed and parallel searches in several threads & mdash; There is no charge for connecting any new network devices or protocols, it is merely modular. The official site of the program allows third-parties to write optional modules, or one can write on his or her own.
Using special dictionaries as logins and passwords, the program is designed to improve chances of selection, that is to say masks, length, or symbols, which can be composed of, in other words, software as well.Different algorithms were used to generate passwords. During parallel searches on several protocols, the program can run very successfully. Analyzing 1,000 passwords simultaneously, an attack with 800 brute force is effective on average.
Here is a small list of protocols and devices that THC-Hydra can work with: SMTP, POP3, IMAP, SMTP, MySQL, NCP, NNTP, SOCKS, SSH, XMPP and Cisco routers are not included.There are 300 controllers in addition to many more. The user has access to Hydra versions for almost all operating systems, besides it is distributed with open source code, which means that any programmer can see how this or that function is implemented and make sure that there are no malicious inclusions in the code before the pentest.
The THC-As the only piece of software in this field that demonstrates how easy it is to unauthorized users gaining unrestricted access to the system, Hydra should be used extensively by security consultants.
- Is there a high speed of operation?
- Parallel password recovery can be achieved ed secure password recovery on several protocols;
- The IPv6 addresses ship support;
- The ability to run very large dictionaries (at least in gigabytes)
- Services and protocols available in over 50 languages.
- open source code;