Brute Force Attack Demonstration with Hydra

Fajar Purnama
9 min readDec 1, 2020

Figure 0. Bruteforce Illustration

Note

This undergraduate assignment in the Data Security System course is a scientific version of previous tutorial. Actually, we were only given the task of writing an essay on bruteforce, but I happened to try Backtrack Linux at that time and decided to pratice the bruteforce with Hydra. Apart from me, our group consisted of Yulianti Murprayana, Nyoman Arta Jaya, Muhammad Audy Bazly, and Dwi Angga Pratama. This assignment has never been published anywhere and we as the author and copyright holder license this assignment customized CC-BY-SA where anyone can share, copy, republish, and sell it on condition that to state our name as the author and mention that the original and open version available here. If you just want to experiment, just follow the video.

Chapter 1 Introduction

1.1 Background

Bruteforce is a computer network breaching technique by trying all the words in the dictionary as a username and/or password to enter a network. From the…

--

--

Fajar Purnama
Fajar Purnama

Written by Fajar Purnama

this blog contains all my articles licensed under creative commons attribution customized sharealike (cc-by-sa) where you can sell but mention the open one here

No responses yet