Hydra
% bruteforce, access
Hydra - ssh - userlist and password list - 22
plateform/linux #target/remote #protocol/ssh #port/22 #cat/ATTACK/BRUTEFORCE-SPRAY
Hydra - ssh - user and password - 22
plateform/linux #target/remote #protocol/ssh #port/22 #cat/ATTACK/BRUTEFORCE-SPRAY
Hydra - ssh - user=password - 22
plateform/linux #target/remote #protocol/ssh #port/22 #cat/ATTACK/BRUTEFORCE-SPRAY
Hydra - ssh - null password - 22
plateform/linux #target/remote #protocol/ssh #port/22 #cat/ATTACK/BRUTEFORCE-SPRAY
Hydra - ssh - password=reverseuser - 22
plateform/linux #target/remote #protocol/ssh #port/22 #cat/ATTACK/BRUTEFORCE-SPRAY
Hydra - ssh - file "login:pass" format - 22
plateform/linux #target/remote #protocol/ssh #port/22 #cat/ATTACK/BRUTEFORCE-SPRAY
Hydra - ftp - 21
protocol/ftp #port/21 #plateform/linux #target/remote #cat/ATTACK/BRUTEFORCE-SPRAY
Hydra - smb - 445
protocol/smb #port/445 #plateform/linux #target/remote #cat/ATTACK/BRUTEFORCE-SPRAY
Hydra - mysql - 3306
protocol/mysql #port/3306 #plateform/linux #target/remote #cat/ATTACK/BRUTEFORCE-SPRAY
Hydra - vnc - 5900
protocol/vnc #port/5900 #plateform/linux #target/remote #cat/ATTACK/BRUTEFORCE-SPRAY
Hydra - postgres - 5432
protocol/postgres #port/5432 #plateform/linux #target/remote #cat/ATTACK/BRUTEFORCE-SPRAY
Hydra - telnet - 23
protocol/telnet #port/23 #plateform/linux #target/remote #cat/ATTACK/BRUTEFORCE-SPRAY
= userlist: users.txt = passlist: pass.txt