Sponsored Content
Full Discussion: THC-Hydra problem
Top Forums UNIX for Dummies Questions & Answers THC-Hydra problem Post 302343536 by Mr~Beam on Wednesday 12th of August 2009 06:33:33 PM
Old 08-12-2009
THC-Hydra problem

Hi.

I downloaded THC-Hydra for testing. I'm running Hydra in DOS commandprompt under a Windows XP Home PC. I know this is a UNIX related forum, but the commands for Hydra are same as in UNIX. And there are more experienced people in the UNIX community. I tried in Ubuntu first, with VirtualBox, but couldn't get it to work. And no, i didn't just try it once, i was trying to solve the problems for hours but in the end i got tired, and saw that there was a windows version of the software(lazy me). Now i run Hydra in the commandprompt.

Anyway, I have problems with it. I want to test perform an attack threw https against a website. I tried http://www.habbo.se as an example(Swedish version of this very lame Sulake project). My bigger sister also forgot her password there, and registered with the wrong DOB information and I thought hopefully i can crack it(she knows her usrname).

I found this in the source on the site www.habbo.se code:

<form action="https://www.habbo.se/account/submit" method="post">

Then the execution of hydra.exe should look like this right?

Code:
hydra -L users.txt -P passwords.txt -O logs.txt http://www.habbo.se https-form-post -F "/account/submit:credentials.username=^USER^&credentials.password=^PASS^&login=Logga in:Felaktigt lösenord"

I don't know if i have to explain the commands because you probably have more experience than me, but this is what these lines do:

-L = List of usernames to enter in the credentials.username field. The username replaces ^USER^
-P = Same as -L but for passwords
-O = It's used if you want to store the correct founded password in a file.
https-form-post = I think the protocol should be https, because of login function is http://www.habbo.se/account/submit. If I'm wrong, maybe that is the problem. Form-post is used to send the data to the fields on the site. Same as when you login at a site.

The last line in the quotes "" tells hydra where the parameters/fields are on the site. I think i did it right there(i followed the readme file).


When i execute it with these settings, the commandprompt just reruns the hydra.exe file(wich prints the list of commands for hydra) and ignores these settings. No attack performed. Strange because if i got some feedback of the problem maybe i could solve it.

I've been trying to solve this problem for a long time now.

Oh, by the way. The site have limited login performs. When four performs has been made, the site gives a code to enter together with the username and password, like this:

4th try:
user:
password:

please enter the code of the picture:

Is there anyway to bypass this?

Really grateful for help. Sorry for my bad english grammar. English is not my mother tounge.

And I have been reading the rules, but if it is some more information you need to help me, just tell me.
 

10 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

SSH Problem auth problem

Hi, Just recently we seem to be getting the following error message relating to SSH when we run the UNIX script in background mode: warning: You have no controlling tty. Cannot read confirmation.^M warning: Authentication failed.^M Disconnected; key exchange or algorithm negotiation... (1 Reply)
Discussion started by: budrito
1 Replies

2. Shell Programming and Scripting

problem with dd command or maybe AFS problem

Hi, folks. Sorry for bothering, but maybe someone could help me please. The problem is the following: there is some script that copies files from local file system to AFS. The copying is performed with dd command. The script copies data into some AFS volumes. The problem appeared with one... (0 Replies)
Discussion started by: Anta
0 Replies

3. Shell Programming and Scripting

ssh script problem problem

Hi Please help me with the following problem with my script. The following block of code is not repeating in the while loop and exiting after searching for first message. input_file ========== host001-01 host001-02 2008-07-23 13:02:04,651 ConnectionFactory - Setting session state... (2 Replies)
Discussion started by: pcjandyala
2 Replies

4. Solaris

problem in finding a hardware problem

Hi I am right now facing a strange hardware problem. System get booted with the following error: Fatal Error Reset CPU 0000.0000.0000.0003 AFSR 0100.0000.0000.0000 SCE AFAR 0000.07c6.0000.1000 SC Alert: Host System has Reset It happen 4 or 5 times and get the same error every time.I... (8 Replies)
Discussion started by: girish.batra
8 Replies

5. AIX

user login problem & Files listing problem.

1) when user login to the server the session got colosed. How will resolve? 2) While firing the command ls -l we are not able to see the any files in the director. but over all view the file system using the command df -g it is showing 91% used. what will be the problem? Thanks in advance. (1 Reply)
Discussion started by: pernasivam
1 Replies

6. Red Hat

Mail Problem. Maybe, it is a DNS Problem!

Hi, i've a redhat linux 9 upadated by redhat from 7 version to 9 version. A couple of days ago i was a problem with my mail, in other words i'm not able to get any email nor to send any email. I've a proxy configuration and i tried to set iptables in order to verify the port. The 110,255 and 995... (1 Reply)
Discussion started by: pintalgi
1 Replies

7. UNIX for Dummies Questions & Answers

DHCP problem and eth1 problem

At work I am trying to get this one Linux machine (let's call it ctesgm07) to behave like another Linux machine that we have (let's call it test007). test007 returns the following version info: cat /etc/debian_version: lenny/sid uname -a: Linux test007 2.6.27-7-generic #1 SMP Tue Nov 4... (0 Replies)
Discussion started by: sllinux
0 Replies

8. AIX

AIX OS problem? network problem?

Dear ALL. I installed AIX OS on customer sites. but Only one site is too slow when I connected telnet, ftp.. Ping is too fast. but telnet and FTP is not connected.. of course i check the configuration file on aix but it's normal. Do any Idea?? thanks in advance. - Jun - (3 Replies)
Discussion started by: Jeon Jun Seok
3 Replies

9. IP Networking

Problem with forwarding emails (SPF problem)

Hi, This is rather a question from a "user" than from a sys admin, but I think this forum is apropriate for the question. I have an adress with automatic email forwarding and for some senders (two hietherto), emails are bouncing. This has really created a lot of problems those two time so I... (0 Replies)
Discussion started by: carwe
0 Replies

10. UNIX for Dummies Questions & Answers

sed Or Grep Problem OR Terminal Problem?

I don't know if you guys get this problem sometimes at Terminal but I had been having this problem since yesterday :( Maybe I overdid the Terminal. Even the codes that used to work doesn't work anymore. Here is what 's happening: * I wanted to remove lines containing digits so I used this... (25 Replies)
Discussion started by: Nexeu
25 Replies
GIT-CREDENTIAL(1)						    Git Manual							 GIT-CREDENTIAL(1)

NAME
git-credential - Retrieve and store user credentials SYNOPSIS
git credential <fill|approve|reject> DESCRIPTION
Git has an internal interface for storing and retrieving credentials from system-specific helpers, as well as prompting the user for usernames and passwords. The git-credential command exposes this interface to scripts which may want to retrieve, store, or prompt for credentials in the same manner as Git. The design of this scriptable interface models the internal C API; see the Git credential API[1] for more background on the concepts. git-credential takes an "action" option on the command-line (one of fill, approve, or reject) and reads a credential description on stdin (see INPUT/OUTPUT FORMAT). If the action is fill, git-credential will attempt to add "username" and "password" attributes to the description by reading config files, by contacting any configured credential helpers, or by prompting the user. The username and password attributes of the credential description are then printed to stdout together with the attributes already provided. If the action is approve, git-credential will send the description to any configured credential helpers, which may store the credential for later use. If the action is reject, git-credential will send the description to any configured credential helpers, which may erase any stored credential matching the description. If the action is approve or reject, no output should be emitted. TYPICAL USE OF GIT CREDENTIAL
An application using git-credential will typically use git credential following these steps: 1. Generate a credential description based on the context. For example, if we want a password for https://example.com/foo.git, we might generate the following credential description (don't forget the blank line at the end; it tells git credential that the application finished feeding all the information it has): protocol=https host=example.com path=foo.git 2. Ask git-credential to give us a username and password for this description. This is done by running git credential fill, feeding the description from step (1) to its standard input. The complete credential description (including the credential per se, i.e. the login and password) will be produced on standard output, like: protocol=https host=example.com username=bob password=secr3t In most cases, this means the attributes given in the input will be repeated in the output, but Git may also modify the credential description, for example by removing the path attribute when the protocol is HTTP(s) and credential.useHttpPath is false. If the git credential knew about the password, this step may not have involved the user actually typing this password (the user may have typed a password to unlock the keychain instead, or no user interaction was done if the keychain was already unlocked) before it returned password=secr3t. 3. Use the credential (e.g., access the URL with the username and password from step (2)), and see if it's accepted. 4. Report on the success or failure of the password. If the credential allowed the operation to complete successfully, then it can be marked with an "approve" action to tell git credential to reuse it in its next invocation. If the credential was rejected during the operation, use the "reject" action so that git credential will ask for a new password in its next invocation. In either case, git credential should be fed with the credential description obtained from step (2) (which also contain the ones provided in step (1)). INPUT
/OUTPUT FORMAT git credential reads and/or writes (depending on the action used) credential information in its standard input/output. This information can correspond either to keys for which git credential will obtain the login/password information (e.g. host, protocol, path), or to the actual credential data to be obtained (login/password). The credential is split into a set of named attributes, with one attribute per line. Each attribute is specified by a key-value pair, separated by an = (equals) sign, followed by a newline. The key may contain any bytes except =, newline, or NUL. The value may contain any bytes except newline or NUL. In both cases, all bytes are treated as-is (i.e., there is no quoting, and one cannot transmit a value with newline or NUL in it). The list of attributes is terminated by a blank line or end-of-file. Git understands the following attributes: protocol The protocol over which the credential will be used (e.g., https). host The remote hostname for a network credential. path The path with which the credential will be used. E.g., for accessing a remote https repository, this will be the repository's path on the server. username The credential's username, if we already have one (e.g., from a URL, from the user, or from a previously run helper). password The credential's password, if we are asking it to be stored. url When this special attribute is read by git credential, the value is parsed as a URL and treated as if its constituent parts were read (e.g., url=https://example.com would behave as if protocol=https and host=example.com had been provided). This can help callers avoid parsing URLs themselves. Note that any components which are missing from the URL (e.g., there is no username in the example above) will be set to empty; if you want to provide a URL and override some attributes, provide the URL attribute first, followed by any overrides. NOTES
1. the Git credential API file:///usr/share/doc/git/html/technical/api-credentials.html Git 2.17.1 10/05/2018 GIT-CREDENTIAL(1)
All times are GMT -4. The time now is 07:17 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy