hydra

Поделиться
HTML-код
  • Опубликовано: 21 ноя 2024

Комментарии • 277

  • @davidbombal
    @davidbombal  4 года назад +4

    Disclaimer: Video is for educational purposes only. All equipment is my own. Make sure you learn how to secure your networks and applications.
    Menu:
    Overview: 0:00
    Start hydra: 0:43
    VNC target settings: 1:01
    Attack: 2:18
    Tuning: 2:36
    FTP example: 3:32
    Audit logs: 5:34
    Need help? Join my Discord: discord.com/invite/usKSyzb
    ================
    Connect with me:
    ================
    Discord: discord.davidbombal.com
    Twitter: twitter.com/davidbombal
    Instagram: instagram.com/davidbombal
    LinkedIn: www.linkedin.com/in/davidbombal
    Facebook: facebook.com/davidbombal.co
    TikTok: tiktok.com/@davidbombal
    RUclips: ruclips.net/user/davidbombal
    ================
    Support me:
    ================
    Join thisisIT: bit.ly/thisisitccna
    Or, buy my CCNA course and support me:
    DavidBombal.com: CCNA ($10): bit.ly/yt999ccna
    Udemy CCNA Course: bit.ly/ccnafor10dollars
    GNS3 CCNA Course: CCNA ($10): bit.ly/gns3ccna10
    ======================
    Special Offers:
    ======================
    Cisco Press: Up to 50% discount
    Save every day on Cisco Press learning products! Use discount code BOMBAL during checkout to save 35% on print books (plus free shipping in the U.S.), 45% on eBooks, and 50% on video courses and simulator software. Offer expires December 31, 2020. Shop now.
    Link: bit.ly/ciscopress50
    ITPro.TV:
    itpro.tv/davidbombal
    30% discount off all plans Code: DAVIDBOMBAL
    Boson software: 15% discount
    Link: bit.ly/boson15
    Code: DBAF15P
    Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

    • @arshaneph2473
      @arshaneph2473 Год назад

      hello sir can u help me ? my classmate account facebook got hacked

    • @DavidChikamara
      @DavidChikamara 16 дней назад

      Greetings Mr David, thank you so much for all the good work and educational videos you've been dropping for us. Please I'm having troubles installing Hydra on my windows.. Can you possibly make a video guide. Thanks in anticipation.

  • @educastellini
    @educastellini 4 года назад +9

    -Thanks for the content and the knowledge that the professor passes on to us.
    - Soon after finishing the CCNA and the Linux certification (possibly LPIC-1), I realized that it is VITAL and until the middle of the year possibly CompTIA Security.
    -What I perceive from the security videos is that there is always a way to hack any protocol or system but we can mitigate (make it difficult for the adversary hacker) this is what every good professional, especially people who are network engineers ( that builds the infrastructure) for everything else.
    -Thank you professor...!!!

  • @notalessandro
    @notalessandro 4 года назад +51

    I've always wondered what Hydra does

    • @davidbombal
      @davidbombal  4 года назад +10

      Hope this video shows you some of the capabilities :)

    • @atikulislam3973
      @atikulislam3973 4 года назад +1

      @Alessandro Rojas your are not Hercules , right ?

    • @_ab9551
      @_ab9551 4 года назад

      @@davidbombal please
      Hack mikrotik admin panel wifi
      Winbox v6.44
      Please plesae help me

    • @ronetteprinsloo5048
      @ronetteprinsloo5048 4 года назад

      Haha same and I have been using Kali for a long time now 😅

  • @bertoperez2007
    @bertoperez2007 4 года назад +2

    Always appreciate your simple explanations, thank you for sharing your experiance

    • @davidbombal
      @davidbombal  3 года назад +2

      Thank you! I really appreciate that :)

  • @prakashdas2703
    @prakashdas2703 4 года назад +6

    You have inspired many of us sir.....your content is of very high quality......

    • @davidbombal
      @davidbombal  4 года назад +1

      Thank you Prakash!

    • @ivanguerra1260
      @ivanguerra1260 4 года назад

      Dear Mr.BombAll, teach us how to fight corrupted goverments as ours here in Latin America, Thanks !!

  • @renebraun1313
    @renebraun1313 3 года назад +6

    Thank you Sir, thank you for you ability to teach in an awesome way. You motivated me to get started with Linux, I actually felt in love with it :)

  • @mgabriel650
    @mgabriel650 3 года назад +1

    Sir I am so grateful for all your content, I will join this is it to support your work.

  • @shellgenius
    @shellgenius 4 года назад +10

    Tha k u sir
    Sir can upload a video of cryptography,hash, algorithm, salt

    • @davidbombal
      @davidbombal  4 года назад +4

      Thank you for the suggestion!

  • @vyasG
    @vyasG 4 года назад +1

    Thanks for this Video. When I saw the name hydra, I just remembered - cut one, and two will be in its place.

  • @satvikvarun6386
    @satvikvarun6386 3 года назад +2

    This channel is gold!

  • @Paradox666-66
    @Paradox666-66 4 года назад

    I just discover this channel and I want to learn more about Cybersecurity. Guess I found an exellent one !

    • @davidbombal
      @davidbombal  4 года назад

      Thank you. And welcome!

    • @Paradox666-66
      @Paradox666-66 4 года назад

      @@davidbombal Just a question, is there a way to counter this type of attack ? Because if we have to check manually our log.... As you said it takes time or it won't be seen

    • @davidbombal
      @davidbombal  4 года назад +1

      @@Paradox666-66 That is a big topic and it often depends. I'll cover security practices in another video.

    • @MrLawrence304
      @MrLawrence304 4 года назад +2

      @@Paradox666-66 Depending on the type of system in active directory you can set the account to lock out after a certain number of failed login attempts. After that a Domain admin has to go in and unlock the account. If you set it for locking after three attempts then it would stop this kind of attack as long as your users use decent passwords.

    • @Paradox666-66
      @Paradox666-66 4 года назад

      @@davidbombal looking forward to it

  • @shubhamkumar-wn2gj
    @shubhamkumar-wn2gj 4 года назад

    thanks sir for uploading new videos 🙏🏻 your teaching skill is god gifted ❤️

    • @davidbombal
      @davidbombal  3 года назад

      I really appreciate that, Shubham :)

  • @nnyx86
    @nnyx86 4 года назад +1

    Excellent video as always David. Can you make a video explaining hashcat? It is very intresting method...

    • @davidbombal
      @davidbombal  4 года назад

      Thank you. Great suggestion :)

  • @school_education242
    @school_education242 3 года назад +1

    very high quality content ♥

  • @ujithadharshana7397
    @ujithadharshana7397 4 года назад

    Sir Bombal is the best teacher

    • @davidbombal
      @davidbombal  4 года назад

      Thank you Ujitha. I really appreciate that!

  • @krisnapranavelangovan6453
    @krisnapranavelangovan6453 4 года назад

    A nice explanation on hydra👍

  • @morganator4874
    @morganator4874 3 года назад

    Brilliant informative video

  • @arka7869
    @arka7869 4 года назад +2

    Awesome content, thank you very much! Could you also do a video on how to secure Windows against attacks and spyware "calling home"? This question was triggered when I saw the "Audit program" in your video.

  • @KiranKumar-dw4vq
    @KiranKumar-dw4vq 4 года назад +1

    Awesome👏😊
    Every video I see of you is awesome and interesting sir

  • @lakiluci474
    @lakiluci474 4 года назад

    Watching your videos from Congo , Africa

    • @davidbombal
      @davidbombal  4 года назад +1

      Thank you for watching!

    • @lakiluci474
      @lakiluci474 4 года назад

      @@davidbombal merci baucop , if i want to contact you , how i can contact you ?? thank you

  • @amarashfaq8359
    @amarashfaq8359 4 года назад +1

    Another awesome video

  • @klap7321
    @klap7321 4 года назад

    david i don't know for sure that you will see the comment or reply , but i just wanted to tell you that Your content is amazing buddy, this is the 7th video i'm watching today i discovered your channel from Udemy and enrolled in few courses thanks alot man. nd please keep uploading this type of content (Networking,Python,EthicalHacking). Thanks have a great day

    • @davidbombal
      @davidbombal  4 года назад +1

      Thank you! I appreciate your support!

    • @klap7321
      @klap7321 4 года назад

      @@davidbombal

    • @klap7321
      @klap7321 4 года назад

      @@davidbombal i think i'm spending the night here 😅🥰

  • @dhairyabhatt3052
    @dhairyabhatt3052 4 года назад

    Sir, What is difference between operational and administrative trunking encapsulation ?

  • @prosperdedume8183
    @prosperdedume8183 3 года назад +1

    I was searching for Hydra,as in the organism

  • @charles5077
    @charles5077 4 года назад

    Good work David

  • @johnwick-yo7ov
    @johnwick-yo7ov 4 года назад

    Please make videos on encryption your explanation is really good.

    • @davidbombal
      @davidbombal  4 года назад +1

      Thank you John. Great suggestion.

  • @WirelessCharger344
    @WirelessCharger344 2 года назад +1

    What I have to do if it says in all ERROR VNC, but all the time

  • @toor2824
    @toor2824 4 года назад

    Every content worth watching 😍😍😍

  • @gamingsportz3390
    @gamingsportz3390 4 года назад +1

    CS student here. Can you make a video about software engineering in cyber security. Showing the pros and cons as well as your personal view on that topic?
    I am asking since I don't wanna rely on reddit posts on future decisions regarding cyber security and SWE 😁

    • @davidbombal
      @davidbombal  4 года назад +1

      Thank you for the suggestion

    • @gamingsportz3390
      @gamingsportz3390 4 года назад

      @@davidbombal Thanks for taking it into account!

  • @h4ze317
    @h4ze317 4 года назад

    What is difference between RDP and VNC

  • @personal_account123
    @personal_account123 3 года назад

    Sir if possible can u explain internal behaviour of system while hacking like what is going in system while we are using hydra

  • @kr4k3nn
    @kr4k3nn 4 года назад +1

    Awesome video sir... Sir can you explain what are the differences between brute force and dictionary attack cause in both cases they use hit and trial method. And one humble request to you sir, can you show us how to create a effective wordlist according to our needs(based on target) cause this rockyou.txt is only good for ctf not for actual pentest. Thank you for this great content.

    • @davidbombal
      @davidbombal  4 года назад +1

      Thank you. Brute force tries all variations until it finds the right combination. Dictionary is a prebuilt list of words.

  • @aamirhhadiborjiany8504
    @aamirhhadiborjiany8504 3 года назад

    Your language and the way u explain and justify the steps are outstanding! I've watched some of your videos and realized that u use the "rockyou.txt" file. My question is how can I get that file? And then, how can I use it?

  • @8Jallin
    @8Jallin 4 года назад +1

    Cool video, I'm watching your udemy course, its taking me a bit but I'll be alright. Hopefully I can be CCNA Certified next year.
    I might jump into security If I get a job in networking. Funny that I'm an adult now but used to play with tools like these when I was a teenager ;)

  • @itsme7570
    @itsme7570 3 года назад

    But don't you have to be on same network for this to work? Like you can't just point at any computer on the world but only on your same vpn or physical network?

  • @defyteryt2452
    @defyteryt2452 4 года назад +1

    Fist tool I saw wen i installed kali linux is hydra.It good

    • @davidbombal
      @davidbombal  4 года назад +1

      It's a good tool :)

    • @defyteryt2452
      @defyteryt2452 4 года назад +1

      @@davidbombal thank you very much sir . I feel the passion of the professional way that you explain in vedio 😊😊

  • @adambrown3918
    @adambrown3918 4 года назад

    Tips on hardening VNC? Also what are some good or better multiplatform adminstration tools you recommend?

    • @davidbombal
      @davidbombal  4 года назад +1

      Great suggestion. Look at RealVNC which has more security built in (but I haven't tested it properly). Only allow certain connections (lock down who can access the server). Or just don't use it and try something else :) I'll put together a proper video on this I think.

    • @adambrown3918
      @adambrown3918 4 года назад

      @@davidbombal Thanks, David. 😊

  • @footballclip3019
    @footballclip3019 3 года назад

    Hello sir, what apl did u use for screen sharing on mac?

  • @jellekettner9638
    @jellekettner9638 3 года назад

    how did you find the targets ip, port and protocol?

  • @Jawlaya
    @Jawlaya 4 года назад

    Sir You Are great,, 👍🏻👍🏻👍🏻

  • @ashishpatel350
    @ashishpatel350 4 года назад +2

    HAIL HYDRA

  • @bernabasberhanu7766
    @bernabasberhanu7766 3 года назад

    thank you my best man, you always motivated me

  • @user-fk7rv5lr7p
    @user-fk7rv5lr7p 4 года назад +18

    Bro tell me how to Bypass otp (one time password)

  • @nicholassattaur9964
    @nicholassattaur9964 4 года назад

    Amazing video!

  • @Shura777_
    @Shura777_ 4 месяца назад

    where i can find the share screen application

  • @Raza_9798
    @Raza_9798 4 года назад

    Brutforce isn't a good idea to attack / get access from victims. it will take too much time to do the work

  • @sergiyrr5153
    @sergiyrr5153 3 года назад

    @David Bombal could you please tell me how to find the protocol type for a device?
    thanks :)

  • @spencerreppe7558
    @spencerreppe7558 4 года назад

    Logs are important

  • @lakinduweerapperumage3329
    @lakinduweerapperumage3329 4 года назад

    Awsome 🙏🏻

  • @subhrothetechnoguru
    @subhrothetechnoguru 4 года назад +1

    Nice....can you please tell me that can we track somebody if the person is using VPN and tor combination

  • @princechaudhary9197
    @princechaudhary9197 3 года назад +1

    Hail hydra

  • @jhonwick2590
    @jhonwick2590 4 года назад

    I wonder you can creat video about rudy attack

  • @MJ-kz6tt
    @MJ-kz6tt 4 года назад

    can you advice me some good resourses? I'm really interested, also I'm makeing resources in cybersecurity>>

  • @joelbalogun5523
    @joelbalogun5523 3 года назад

    How do you get hydra in the first place

  • @noorgul1176
    @noorgul1176 4 года назад

    can we bruteforce on OTP?

  • @hlbgghj
    @hlbgghj 3 года назад

    sir how about netcat attack on ports

  • @manteksarai8322
    @manteksarai8322 4 года назад +2

    @David Bombal Hi.. any app to track someone or mobile phone by phone number ? Can u help me

  • @karanb2067
    @karanb2067 4 года назад

    I don't know how hackers remember so many bash commands to run a pentest tool....there are so many combinations that are possible for even a single tool...

    • @davidbombal
      @davidbombal  4 года назад +1

      Use man or --help if in doubt. Like all things in life, the more you do something the easier it becomes

  • @devrajgupta5036
    @devrajgupta5036 4 года назад +1

    Sir you always try something different and make us more attracted towards CYBER SECURITY , Thanks for spreading your knowledge. I WISH THAT ONE DAY I WOULD ALSO BE CREATING A GOOD CONTENT ON SECURITY LIKE YOU ON RUclips. 😁😉

  • @galaxysam1375
    @galaxysam1375 3 года назад

    Can i change the id of my computer like mac or other numbers that tell others who i am or is there a other solution?

  • @utorrent6054
    @utorrent6054 4 года назад

    Is it same attack in android? 🤔🤔

  • @martiniracing1146
    @martiniracing1146 3 года назад

    I Have all time fault: Error Child with pid 6313 terminating, can not connect. Sir can you help?

  • @avr512
    @avr512 4 года назад

    Wow. Thats interesting sir

    • @davidbombal
      @davidbombal  3 года назад +1

      Thank you for watching Rashid

  • @oscarhernandes1129
    @oscarhernandes1129 4 года назад

    Do you have any video talking about how to install Linux in a Pc ?

  • @tabisharshad8470
    @tabisharshad8470 4 года назад

    Hi David
    My name is tabish im a student of software ENG actully im in first semester and i want to learn hacking where to start where to end dont know any thing but i watched your vdo's and think you are a very good teacher so my request is plz make a playlist and teach students about hacking with linux from start and dont know you read this or not and also im not good in english typing i can understand but cant write so ignore if any thing is wrong😂
    And also your vdo's are awsm

  • @sscoconut1265
    @sscoconut1265 3 года назад

    what if the password is complex? you cant just .txt bruteforce your way into it right?

  • @mujtabam265
    @mujtabam265 4 года назад +1

    We don't know the IP address of the victim always
    so in that case how do we proceed, how do we get the IP address and the Port number.?

    • @jonnav3107
      @jonnav3107 4 года назад +1

      With python sockets and social engineering.

  • @wargel03
    @wargel03 4 года назад +1

    I can use the screen sharing on windows? And how

    • @davidbombal
      @davidbombal  4 года назад

      Watch this video: ruclips.net/video/mIdF7K3Nmlw/видео.html

  • @streetballgh
    @streetballgh 4 года назад +1

    Nice tool , I wish I had a laptop

    • @davidbombal
      @davidbombal  4 года назад +1

      Hope you can get a laptop or PC sometime :)

    • @claussanta2341
      @claussanta2341 4 года назад

      Maybe a raspberry is an option?

    • @streetballgh
      @streetballgh 4 года назад

      @@davidbombal guessing , ur laptop could solve my problem

  • @rudyc79
    @rudyc79 4 года назад

    What if they were set up to lock you out after so many failed password attempts? Is there a way around that?

  • @thelitist
    @thelitist 4 года назад

    PRO DAVID

  • @nateo7045
    @nateo7045 4 года назад

    Would this work outside of local network just the same??

    • @davidbombal
      @davidbombal  4 года назад

      If you had access because the user opened ports / allowed access to the server.

  • @endlessVoiid
    @endlessVoiid 4 года назад

    nice one sir

  • @johnalquitela9898
    @johnalquitela9898 3 года назад

    where can i have the link
    ive been searching for it

  • @joseatag1178
    @joseatag1178 4 года назад

    I like your videos sir 👍

  • @mr._ashitey
    @mr._ashitey 4 года назад

    Please how do I make my eth0 ip open to all my device on the internet
    ..I mean when i create a website attack vector and I type the ip in my browser on my android nothing comes...Please help me sir

  • @artbear5653
    @artbear5653 3 года назад +1

    So as I understand the list he is using contains random passwords from which one is the laptops? So in case the password is complex not logical it will survive the attack? as I see the software just tries all the given password in the list, good only to automate the manual input of million passwords, but you have to have the list with the passwords already, so what would be the approach to hack the password without the list?

  • @komaboi19
    @komaboi19 4 года назад

    Why would you need VNC on a local network if you have remote connections allowed in Windows? Can't you just use Remote Desktop Connection?

    • @davidbombal
      @davidbombal  4 года назад +1

      Have you tried that on Windows home edition?

    • @komaboi19
      @komaboi19 4 года назад

      @@davidbombal Nope--I've been fortunate enough to have Professional versions of Windows. 😁

  • @collegevibes6749
    @collegevibes6749 4 года назад

    Amazon carding
    scam or real..?

  • @BlackWolF_1374
    @BlackWolF_1374 3 года назад

    But how can I get the port to do that?

  • @jorditribo94
    @jorditribo94 4 года назад

    After seeing your last 10 videos I have a question. If you use Windows and Linux, why your main computer is a Mac?

    • @davidbombal
      @davidbombal  4 года назад

      I use all three operating systems (and others like Cisco IOS, Apple iOS, VMware ESXi etc etc). My Mac is my main computer for daily work (video editing, e-mail etc etc)

  • @binhlethanh4121
    @binhlethanh4121 3 года назад

    how can i open Screen Sharing ?

  • @favouranthony1311
    @favouranthony1311 29 дней назад

    Great video!!! but please i tried installing hydra-gtk o my kali linux on android, but it keeps saying unable to locate package hydra-gtk what is the solution please??

  • @bypassscreenshares5380
    @bypassscreenshares5380 3 года назад

    I tested hydra on myself to try to learn it. I tried cracking a Gmail account I made for testing, and around every minute it would false flag passwords, and it never found the password because it kept false flagging password. Is there a way to fix it

  • @lucaspascual5956
    @lucaspascual5956 4 года назад

    Thank you Sr.

  • @aishakhan1242
    @aishakhan1242 2 года назад

    I need to download the tool kali Linux first which I tried to download this but the download didn’t complete and now I have a blank screen with this - symbol on it when I press any key nothings coming up on the screen so the problem is I don’t know how to get rid of this tool kali Linux from the laptop and restart the laptop back to normal go back to window so I can restart the kali Linux download from the beginning please help with this would really appreciate it

  • @madaraekouta8058
    @madaraekouta8058 4 года назад

    Hi David ! Please what is the title of the music listened to the end?

    • @davidbombal
      @davidbombal  4 года назад +1

      Here you go: In And Out Of Love (Tigerblood Jewel Remix): www.epidemicsound.com/track/4u2ef6c7WM/

  • @sayandebnath7431
    @sayandebnath7431 4 года назад

    Sir, please tell how to clear command history from kali. As I'm using 'history - c' but it's showing "not found"

    • @krah8052
      @krah8052 4 года назад

      sudo history -c

    • @sayandebnath7431
      @sayandebnath7431 4 года назад

      @@krah8052 Thank you, Professor K. I appreciate it. Can you tell me in which University you teach?

    • @krah8052
      @krah8052 4 года назад +1

      @@sayandebnath7431 UMGC, Rasmussen, Columbia Southern University, APUS, IndianaTech and SJVC.

  • @m3hdim3hdi
    @m3hdim3hdi 3 года назад

    Is that a Hydralisk?

  • @chabie617
    @chabie617 2 года назад

    can it be downloaded on windows?

  • @mundoin5583
    @mundoin5583 4 года назад

    All Hail Hydra!

  • @guskarlicki1586
    @guskarlicki1586 3 года назад

    i got an error where i was missing libssh cns u help figure out the issue

  • @rajughorai3909
    @rajughorai3909 4 года назад

    hail hydra

  • @RikGeboers
    @RikGeboers 4 года назад

    Nice video rly love your content.
    However this is all provided you have a file wich includes the password.
    What if the targets password was not in the list? Do you just wait and read network packages and just put all the data in a text file?

  • @JDguimaraes88
    @JDguimaraes88 3 года назад

    Easy when you add the right password to the wordlist...if the password not exists in your wordlist
    the password will not appear by miracle

  • @tonyannamameni8592
    @tonyannamameni8592 Год назад

    Please share how to use hydra in termux

  • @Bergerons_Review
    @Bergerons_Review 3 года назад

    Can you set up a warning for the windows machine so a human doesn't have to watch it in real-time?

  • @saravananb8572
    @saravananb8572 4 года назад

    Are you attacking in same network?

  • @sudharshanv9443
    @sudharshanv9443 4 года назад +1

    ❤️❤️

  • @angryapple1882
    @angryapple1882 4 года назад

    Kind of confusing me there, you were saying I’m going to connect with my Mac but you were using Kali OS

    • @davidbombal
      @davidbombal  4 года назад +1

      I'm running Kali Linux in VMware on my Mac. So, I am connecting from my Mac :)

    • @angryapple1882
      @angryapple1882 4 года назад

      @@davidbombal Does Kali Linux run better on VMWare than on Virtual Box? The reason I ask is because watching your video it is running real smooth

    • @davidbombal
      @davidbombal  4 года назад +1

      @@angryapple1882 I prefer VMware Fusion on a Mac. I also use VMware Workstation on Windows. I prefer VMware, but some people prefer VirtualBox.

    • @angryapple1882
      @angryapple1882 4 года назад

      @@davidbombal Thanks for the reply back, Sir! Ill give VMWare a try