Credential Access with THC Hydra

THC Hydra is a fast and powerful parallelized network login cracker with support for a wide variety of network protocols. Skill up your brute forcing techniques by leveraging THC Hydra to identify weak passwords.
Course info
Level
Intermediate
Updated
Jan 27, 2020
Duration
22m
Table of contents
Description
Course info
Level
Intermediate
Updated
Jan 27, 2020
Duration
22m
Description

There's no way around it - people are going to use weak passwords. THC Hydra will help you identify these passwords so that you can then use the information towards Red or Blue Teaming efforts. In this course, Credential Access with THC Hydra, you will learn how to brute force network logins. First, you will see where THC Hydra fits into the kill chain and the Mitre ATT&CK framework. Next, you will discover how the flexibility of THC Hydra can assist you in cracking passwords for various network protocols. Finally, you will explore how to leverage the password cracking capabilities of THC Hydra towards your own penetration testing or password strength assessment activities. When you are finished with this course, you will have the skills and knowledge needed to efficiently use THC Hydra towards your password cracking efforts.

About the author
About the author

Lee Allen is a penetration tester by trade. Lee has authored four books about penetration testing and has created several Pluralsight courses.

More from the author
Lateral Movement with Mimikatz
Intermediate
28m
May 1, 2020
Credential Access with Mimikatz
Intermediate
25m
Mar 30, 2020
More courses by Lee Allen
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
[Autogenerated] way. Welcome to Plural site and this Cyber Security tools. Course featuring T H C. Hydra, the open Source network. Log in Cracking, tool, developed and maintained by Mark Van Hauser. Hughes. Weak passwords could be guest using brute forcing techniques. Credential sets gained by these techniques are often used towards initial access into a system teach. See Hydra is a fast network log in brute forcing tool with support for various network protocols. If you are seeking to learn how teach, see Hydra can be used to obtain valid credential sets during security engagements. Or if you just want to learn how Attackers are able to perform these activities, come join me and learn howto find valid credential sets using th See Hydra here at plural site.