sto cercando di testare la sicurezza della mia password per la mail che ho con Gmail, come si può evincere anche dal codice sottostante; dopo aver installato e compilato tutto, lancio da terminale Hydra, digitando l'omonima parola, e mi viene, come da prassi, l'elenco delle features.
Poi lancio il comando sottostante, e qui cominciano i problemi.
- Codice: Seleziona tutto
hydra pop.gmail pop3 -s 995 -v l Alessandro.Vacchiri -P /home/alex/Scrivania/dic.txt
Di seguito, riporto il listato risultante:
- Codice: Seleziona tutto
Hydra v7.2 (c)2012 by van Hauser/THC & David Maciejak - for legal purposes only
Hydra (http://www.thc.org/thc-hydra) starting at 2012-07-27 00:46:26
Syntax: hydra [[[-l LOGIN|-L FILE] [-p PASS|-P FILE]] | [-C FILE]] [-e nsr] [-o FILE] [-t TASKS] [-M FILE [-T TASKS]] [-w TIME] [-W TIME] [-f] [-s PORT] [-x MIN:MAX:CHARSET] [-SuvV46] [server service [OPT]]|[service://server[:PORT][/OPT]]
Options:
-R restore a previous aborted/crashed session
-S perform an SSL connect
-s PORT if the service is on a different default port, define it here
-l LOGIN or -L FILE login with LOGIN name, or load several logins from FILE
-p PASS or -P FILE try password PASS, or load several passwords from FILE
-x MIN:MAX:CHARSET password bruteforce generation, type "-x -h" to get help
-e nsr try "n" null password, "s" login as pass and/or "r" reversed login
-u loop around users, not passwords (effective! implied with -x)
-C FILE colon separated "login:pass" format, instead of -L/-P options
-M FILE server list for parallel attacks, one entry per line
-o FILE write found login/password pairs to FILE instead of stdout
-f exit after the first found login/password pair (per host if -M)
-t TASKS run TASKS number of connects in parallel (default: 16)
-w / -W TIME waittime for responses (32s) / between connects per thread
-4 / -6 prefer IPv4 (default) or IPv6 addresses
-v / -V verbose mode / show login+pass combination for each attempt
-U service module usage details
server the target server (use either this OR the -M option)
service the service to crack. Supported protocols: cisco cisco-enable cvs ftp[s] http[s]-{head|get} http[s]-{get|post}-form http-proxy http-proxy-urlenum icq imap irc ldap2 ldap3[-{cram|digest}md5] mssql mysql(v4) nntp oracle-listener oracle-sid pcanywhere pcnfs pop3 rdp rexec rlogin rsh sip smb smtp smtp-enum snmp socks5 ssh teamspeak telnet vmauthd vnc xmpp
OPT some service modules need special input (use -U to see module help)
Hydra is a tool to guess/crack valid login/password pairs - usage only allowed
for legal purposes! Find the newest version at http://www.thc.org/thc-hydra :-)
Use HYDRA_PROXY_HTTP/HYDRA_PROXY and HYDRA_PROXY_AUTH environment for a proxy.
The following services were not compiled in: postgres sapr3 firebird afp ncp svn oracle mysql5 and regex support.
Examples:
hydra -l john -p doe 192.168.0.1 ftp
hydra -L user.txt -p secret 192.168.0.1 imap PLAIN
hydra -l admin -P pass.txt http-proxy://192.168.0.1
hydra -C defaults.txt -6 imap://[fe80::2c:31ff:fe12:ac11]:143/PLAIN
Credo sia un errore di sintassi, ma non capisco dove sia; ammesso che sia quello il problema.
Grazie a chiunque vorrà aiutarmi.