Hydra
Offensive cracker
Open Source
Credential brute force tool
Platforms:
linux windows macos
Prerequisites:
networking authentication
Pros and Cons
Ventajas
- + Support for 50+ protocols
- + Very fast and efficient
- + Configurable parallelization
- + Open-source
- + Well documented
Desventajas
- - Can be easily blocked
- - Improper use is illegal
- - Generates a lot of traffic
Casos de Uso
- Password auditing
- Pentesting
- Security assessments