Credential Access with THC Hydra

THC Hydra is a fast and powerful parallelized network login cracker with support for a wide variety of network protocols. Skill up your brute forcing techniques by leveraging THC Hydra to identify weak passwords.
Course info
Level
Intermediate
Updated
Aug 19, 2020
Duration
27m
Table of contents
Description
Course info
Level
Intermediate
Updated
Aug 19, 2020
Duration
27m
Description

There's no way around it - people are going to use weak passwords. THC Hydra will help you identify these passwords so that you can then use the information towards Red or Blue Teaming efforts. In this course, Credential Access with THC Hydra, you will learn how to brute force network logins. First, you will see where THC Hydra fits into the kill chain and the Mitre ATT&CK framework. Next, you will discover how the flexibility of THC Hydra can assist you in cracking passwords for various network protocols. Finally, you will explore how to leverage the password cracking capabilities of THC Hydra towards your own penetration testing or password strength assessment activities. When you are finished with this course, you will have the skills and knowledge needed to efficiently use THC Hydra towards your password cracking efforts.

About the author
About the author

Lee Allen is a penetration tester by trade. Lee has authored four books about penetration testing and has created several Pluralsight courses.

More from the author
Credential Access with Mimikatz
Intermediate
25m
Aug 14, 2020
More courses by Lee Allen
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Welcome to Pluralsight and this cybersecurity tools course featuring THC Hydra, the open source network login tool cracking tool developed and maintained by Mark van‑Hauser Hughes. Weak passwords can be guessed using brute‑forcing techniques. Credential sets gained by these techniques are often used towards initial access into a system. THC Hydra is a fast, network login brute‑forcing tool with support for various network protocols. If you are seeking to learn how THC Hydra can be used to obtain valid credential sets during security engagements, or if you just want to learn how attackers are able to perform these activities, come join me and learn how to find valid credential sets using THC Hydra, here at Pluralsight.