GJGJHJHJG

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Lab Objective:

Learn how to conduct a dictionary attack to crack


passwords online, using Hydra. Lab Purpose: Hydra is an
advanced password cracker which can be used to crack
passwords for online pages, such as the login page of a
website. This is useful as we don’t need to capture a hash and
attempt to crack it offline; we can simply target the login page
itself, with any username and password combination we like.
A dictionary attack is a type of password attack which
uses a combination of words from a wordlist and attempts all
of them in association with a username to login as a user. It
typically takes a long time to perform, and the results are
dependent on the accuracy and quality of your wordlist. A
dictionary attack is a form of brute forcing.
Lab Tool: Kali Linux Lab Topology: You can use Kali
Linux in a virtual machine for this lab. Note: This site has
been developed for the purpose of specific types of hacking.
Never use hydra on any site, system, or network without prior
permission from the owner.
Lab Walkthrough: Task 1: The first step is to power up
Kali Linux in a virtual machine. Then, open the Hydra help
menu with the following command as “root” user: sudo hydra
For this lab, I will be focusing on the command line interface
version of Hydra, but you can also access the GUI version of
hydra using the following command as “root” user: sudo
xhydra Type “hydra -h” to get the help menu and see what
kind of attacks we can run using Hydra.
Note the examples at the bottom of the help menu, which
will provide you with a better idea of the syntax Hydra
supports.
Emails emails emails Nearly every company has a public
website we can browse to get basic information about its
business, areas of expertise, and contact information: generic
email addresses, phone numbers, etc.
A company’s email address is important, in that it gives
away two key elements: The domain name used by their email
service (which may or may not be the same as the official
website’s address) The email’s format: e.g., is it
[email protected]’ or
[email protected]’?
This book is designed to cement the theoretical
knowledge you have gained from reading or watching your
Security+ study guide or video training course. If you have yet
to study up on the theoretical side of things, please check out
our cutting edge video and labs on our sister website,
https://www.howtonetwork.com; our course also features
practice exams that may come in handy. The goal of this book
is to dramatically improve your hands-on skills and speed,
enabling you to succeed in the practical portions of the
Security+ exam and also to transfer your skills to the real
world as a network security engineer. We don’t have space
here to cover anything theoretical, so please refer to your
Security+ study guide to get a good understanding of the
learning points behind each lab. Every lab is designed to cover
a particular theoretical issue, such as the configuration
requirements of SSH, for example. If you want to become
CompTIA Security+ certified, there’s one exam you must first
pass: SY0-601 We’ve done our best to hit every topic
mentioned in the exam syllabus on the CompTIA website.
However, please do check the syllabus on their website,
for they may change as time goes on. Their website also gives
more details on the weighting given to each subject area. It’s
also worth noting, that once we show you how to configure a
certain service or protocol a few times, we stop walking you
through the steps in subsequent labs—to save valuable space.
Anyway, in times of uncertainty, you can always flick back a
few pages to see check how it’s done. We’ve done our best to
keep the topology as simple as possible. For this reason,
almost all labs have been configured on a virtual machine
(with internet access).
Please do check out our resource page, which will cover
any additional information you need, and other material that
are bound to prove useful: https://www.101labs.com/resources
Doing the Labs Apart from a couple of research labs, all the
labs are hands-on. They have been checked by several
students and a senior Linux security consultant, and should be
error-free. Bear in mind that each machine will differ, so your
output may vary from ours in certain instances. If you get
stuck or things aren’t working, we recommend you take a
break and come back to the lab later with a clear mind.
There are many Linux and security support forums out
there where you can ask questions. If you are a member of
101labs.net, you can, of course, also post any of your
enquiries on our forum. Best of luck with your studies, —Paul
Browning, CCNP, MCSE, A+, Net+ —Mark Drinan,
PenTest+, SSCP 101 Labs—Security+ Video Course All of
our 101 Labs books have a walkthrough video for each lab,
hosted on https://www.101labs.net. We only mention this in
case you want an extra boost. We add a new certification
every two months, and each course comes with 200 exam-
style questions. Please use the below coupon code to get a
discount off your joining fee: 101secplus

You might also like