Advertisement
Guest User

Wrong PW

a guest
Aug 31st, 2017
117
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 13.15 KB | None | 0 0
  1. hydra 192.168.101.10 -s 88 http-form-post "/index.php?module=Users&action=Login:__vtrftk=sid%3Ae984330e5ce4886553aa3c3fadef14ed3762d8b5%2C1504182894&username=^USER^&password=^PASS^:Invalid username or password.:H=Cookie: security=medium; PHPSESSID=5243380159a8026e9b91e" -l admin -p cat -d
  2. Hydra v8.6 (c) 2017 by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes.
  3.  
  4. [DEBUG] Output color flag is 1
  5. Hydra (http://www.thc.org/thc-hydra) starting at 2017-08-31 14:47:30
  6. [DEBUG] cmdline: hydra -s 88 -l admin -p cat -d 192.168.101.10 http-form-post /index.php?module=Users&action=Login:__vtrftk=sid%3Ae984330e5ce4886553aa3c3fadef14ed3762d8b5%2C1504182894&username=^USER^&password=^PASS^:Invalid username or password.:H=Cookie: security=medium; PHPSESSID=5243380159a8026e9b91e
  7. [DATA] max 1 task per 1 server, overall 1 task, 1 login try (l:1/p:1), ~1 try per task
  8. [DATA] attacking http-post-form://192.168.101.10:88//index.php?module=Users&action=Login:__vtrftk=sid%3Ae984330e5ce4886553aa3c3fadef14ed3762d8b5%2C1504182894&username=^USER^&password=^PASS^:Invalid username or password.:H=Cookie: security=medium; PHPSESSID=5243380159a8026e9b91e
  9. [VERBOSE] Resolving addresses ...
  10. [DEBUG] resolving 192.168.101.10
  11. [VERBOSE] resolving done
  12. [DEBUG] Code: attack Time: 1504190850
  13. [DEBUG] Options: mode 0 ssl 0 restore 0 showAttempt 0 tasks 1 max_use 1 tnp 0 tpsal 0 tprl 0 exit_found 0 miscptr /index.php?module=Users&action=Login:__vtrftk=sid%3Ae984330e5ce4886553aa3c3fadef14ed3762d8b5%2C1504182894&username=^USER^&password=^PASS^:Invalid username or password.:H=Cookie: security=medium; PHPSESSID=5243380159a8026e9b91e service http-post-form
  14. [DEBUG] Brains: active 0 targets 1 finished 0 todo_all 1 todo 1 sent 0 found 0 countlogin 1 sizelogin 6 countpass 1 sizepass 4
  15. [DEBUG] Target 0 - target 192.168.101.10 ip 192.168.101.10 login_no 0 pass_no 0 sent 0 pass_state 0 redo_state 0 (0 redos) use_count 0 failed 0 done 0 fail_count 0 login_ptr admin pass_ptr cat
  16. [DEBUG] Task 0 - pid 0 active 0 redo 0 current_login_ptr (null) current_pass_ptr (null)
  17. [DEBUG] Tasks 1 inactive 0 active
  18. [DEBUG] child 0 got target 0 selected
  19. [DEBUG] child 0 spawned for target 0 with pid 1869
  20. [DEBUG] head_no 0 has pid 1869
  21. [DEBUG] head_no[0] read n
  22. [DEBUG] send_next_pair_init target 0, head 0, redo 0, redo_state 0, pass_state 0. loop_mode 0, curlogin (null), curpass (null), tlogin admin, tpass cat, logincnt 0/1, passcnt 0/1, loop_cnt 1
  23. [DEBUG] send_next_pair_mid done 1, pass_state 0, clogin admin, cpass cat, tlogin -p, tpass cat, redo 0
  24. [ATTEMPT] target 192.168.101.10 - login "admin" - pass "cat" - 1 of 1 [child 0] (0/0)
  25. DEBUG_CONNECT_OK
  26. [DEBUG] SEND [pid:1869] (166 bytes):
  27. 0000: 4745 5420 2f69 6e64 6578 2e70 6870 3f6d [ GET /index.php?m ]
  28. 0010: 6f64 756c 653d 5573 6572 7326 6163 7469 [ odule=Users&acti ]
  29. 0020: 6f6e 3d4c 6f67 696e 2048 5454 502f 312e [ on=Login HTTP/1. ]
  30. 0030: 300d 0a43 6f6f 6b69 653a 2073 6563 7572 [ 0..Cookie: secur ]
  31. 0040: 6974 793d 6d65 6469 756d 3b20 5048 5053 [ ity=medium; PHPS ]
  32. 0050: 4553 5349 443d 3532 3433 3338 3031 3539 [ ESSID=5243380159 ]
  33. 0060: 6138 3032 3665 3962 3931 650d 0a48 6f73 [ a8026e9b91e..Hos ]
  34. 0070: 743a 2031 3932 2e31 3638 2e31 3031 2e31 [ t: 192.168.101.1 ]
  35. 0080: 300d 0a55 7365 722d 4167 656e 743a 204d [ 0..User-Agent: M ]
  36. 0090: 6f7a 696c 6c61 2f35 2e30 2028 4879 6472 [ ozilla/5.0 (Hydr ]
  37. 00a0: 6129 0d0a 0d0a [ a).... ]
  38. [DEBUG] hydra_receive_line: waittime: 32, conwait: 0, socket: 5, pid: 1869
  39. [DEBUG] RECV [pid:1869] (392 bytes):
  40. 0000: 4854 5450 2f31 2e31 2033 3032 204d 6f76 [ HTTP/1.1 302 Mov ]
  41. 0010: 6564 2054 656d 706f 7261 7269 6c79 0d0a [ ed Temporarily.. ]
  42. 0020: 5365 7276 6572 3a20 6e67 696e 782f 312e [ Server: nginx/1. ]
  43. 0030: 362e 320d 0a44 6174 653a 2054 6875 2c20 [ 6.2..Date: Thu, ]
  44. 0040: 3331 2041 7567 2032 3031 3720 3132 3a34 [ 31 Aug 2017 12:4 ]
  45. 0050: 373a 3436 2047 4d54 0d0a 436f 6e74 656e [ 7:46 GMT..Conten ]
  46. 0060: 742d 5479 7065 3a20 7465 7874 2f68 746d [ t-Type: text/htm ]
  47. 0070: 6c3b 2063 6861 7273 6574 3d55 5446 2d38 [ l; charset=UTF-8 ]
  48. 0080: 0d0a 436f 6e6e 6563 7469 6f6e 3a20 636c [ ..Connection: cl ]
  49. 0090: 6f73 650d 0a58 2d50 6f77 6572 6564 2d42 [ ose..X-Powered-B ]
  50. 00a0: 793a 2050 4850 2f35 2e36 2e33 302d 302b [ y: PHP/5.6.30-0+ ]
  51. 00b0: 6465 6238 7531 0d0a 4578 7069 7265 733a [ deb8u1..Expires: ]
  52. 00c0: 2054 6875 2c20 3139 204e 6f76 2031 3938 [ Thu, 19 Nov 198 ]
  53. 00d0: 3120 3038 3a35 323a 3030 2047 4d54 0d0a [ 1 08:52:00 GMT.. ]
  54. 00e0: 4361 6368 652d 436f 6e74 726f 6c3a 206e [ Cache-Control: n ]
  55. 00f0: 6f2d 7374 6f72 652c 206e 6f2d 6361 6368 [ o-store, no-cach ]
  56. 0100: 652c 206d 7573 742d 7265 7661 6c69 6461 [ e, must-revalida ]
  57. 0110: 7465 2c20 706f 7374 2d63 6865 636b 3d30 [ te, post-check=0 ]
  58. 0120: 2c20 7072 652d 6368 6563 6b3d 300d 0a50 [ , pre-check=0..P ]
  59. 0130: 7261 676d 613a 206e 6f2d 6361 6368 650d [ ragma: no-cache. ]
  60. 0140: 0a4c 6f63 6174 696f 6e3a 2069 6e64 6578 [ .Location: index ]
  61. 0150: 2e70 6870 3f6d 6f64 756c 653d 5573 6572 [ .php?module=User ]
  62. 0160: 7326 7061 7265 6e74 3d53 6574 7469 6e67 [ s&parent=Setting ]
  63. 0170: 7326 7669 6577 3d4c 6f67 696e 2665 7272 [ s&view=Login&err ]
  64. 0180: 6f72 3d31 0d0a 0d0a [ or=1.... ]
  65. [DEBUG] hydra_receive_line: waittime: 32, conwait: 0, socket: 5, pid: 1869
  66. [DEBUG] RECV [pid:1869] (0 bytes):
  67. DEBUG_DISCONNECT
  68. DEBUG_CONNECT_OK
  69. [DEBUG] SEND [pid:1869] (332 bytes):
  70. 0000: 504f 5354 202f 696e 6465 782e 7068 703f [ POST /index.php? ]
  71. 0010: 6d6f 6475 6c65 3d55 7365 7273 2661 6374 [ module=Users&act ]
  72. 0020: 696f 6e3d 4c6f 6769 6e20 4854 5450 2f31 [ ion=Login HTTP/1 ]
  73. 0030: 2e30 0d0a 436f 6f6b 6965 3a20 7365 6375 [ .0..Cookie: secu ]
  74. 0040: 7269 7479 3d6d 6564 6975 6d3b 2050 4850 [ rity=medium; PHP ]
  75. 0050: 5345 5353 4944 3d35 3234 3333 3830 3135 [ SESSID=524338015 ]
  76. 0060: 3961 3830 3236 6539 6239 3165 0d0a 486f [ 9a8026e9b91e..Ho ]
  77. 0070: 7374 3a20 3139 322e 3136 382e 3130 312e [ st: 192.168.101. ]
  78. 0080: 3130 0d0a 5573 6572 2d41 6765 6e74 3a20 [ 10..User-Agent: ]
  79. 0090: 4d6f 7a69 6c6c 612f 352e 3020 2848 7964 [ Mozilla/5.0 (Hyd ]
  80. 00a0: 7261 290d 0a43 6f6e 7465 6e74 2d4c 656e [ ra)..Content-Len ]
  81. 00b0: 6774 683a 2039 360d 0a43 6f6e 7465 6e74 [ gth: 96..Content ]
  82. 00c0: 2d54 7970 653a 2061 7070 6c69 6361 7469 [ -Type: applicati ]
  83. 00d0: 6f6e 2f78 2d77 7777 2d66 6f72 6d2d 7572 [ on/x-www-form-ur ]
  84. 00e0: 6c65 6e63 6f64 6564 0d0a 0d0a 5f5f 7674 [ lencoded....__vt ]
  85. 00f0: 7266 746b 3d73 6964 2533 4165 3938 3433 [ rftk=sid%3Ae9843 ]
  86. 0100: 3330 6535 6365 3438 3836 3535 3361 6133 [ 30e5ce4886553aa3 ]
  87. 0110: 6333 6661 6465 6631 3465 6433 3736 3264 [ c3fadef14ed3762d ]
  88. 0120: 3862 3525 3243 3135 3034 3138 3238 3934 [ 8b5%2C1504182894 ]
  89. 0130: 2675 7365 726e 616d 653d 6164 6d69 6e26 [ &username=admin& ]
  90. 0140: 7061 7373 776f 7264 3d63 6174 [ password=cat ]
  91. HTTP request sent:[0A]POST /index.php?module=Users&action=Login HTTP/1.0[0D][0A]Cookie: security=medium; PHPSESSID=5243380159a8026e9b91e[0D][0A]Host: 192.168.101.10[0D][0A]User-Agent: Mozilla/5.0 (Hydra)[0D][0A]Content-Length: 96[0D][0A]Content-Type: application/x-www-form-urlencoded[0D][0A][0D][0A]__vtrftk=sid%3Ae984330e5ce4886553aa3c3fadef14ed3762d8b5%2C1504182894&username=admin&password=cat[0A]
  92. [DEBUG] hydra_receive_line: waittime: 32, conwait: 0, socket: 5, pid: 1869
  93. [DEBUG] RECV [pid:1869] (392 bytes):
  94. 0000: 4854 5450 2f31 2e31 2033 3032 204d 6f76 [ HTTP/1.1 302 Mov ]
  95. 0010: 6564 2054 656d 706f 7261 7269 6c79 0d0a [ ed Temporarily.. ]
  96. 0020: 5365 7276 6572 3a20 6e67 696e 782f 312e [ Server: nginx/1. ]
  97. 0030: 362e 320d 0a44 6174 653a 2054 6875 2c20 [ 6.2..Date: Thu, ]
  98. 0040: 3331 2041 7567 2032 3031 3720 3132 3a34 [ 31 Aug 2017 12:4 ]
  99. 0050: 373a 3436 2047 4d54 0d0a 436f 6e74 656e [ 7:46 GMT..Conten ]
  100. 0060: 742d 5479 7065 3a20 7465 7874 2f68 746d [ t-Type: text/htm ]
  101. 0070: 6c3b 2063 6861 7273 6574 3d55 5446 2d38 [ l; charset=UTF-8 ]
  102. 0080: 0d0a 436f 6e6e 6563 7469 6f6e 3a20 636c [ ..Connection: cl ]
  103. 0090: 6f73 650d 0a58 2d50 6f77 6572 6564 2d42 [ ose..X-Powered-B ]
  104. 00a0: 793a 2050 4850 2f35 2e36 2e33 302d 302b [ y: PHP/5.6.30-0+ ]
  105. 00b0: 6465 6238 7531 0d0a 4578 7069 7265 733a [ deb8u1..Expires: ]
  106. 00c0: 2054 6875 2c20 3139 204e 6f76 2031 3938 [ Thu, 19 Nov 198 ]
  107. 00d0: 3120 3038 3a35 323a 3030 2047 4d54 0d0a [ 1 08:52:00 GMT.. ]
  108. 00e0: 4361 6368 652d 436f 6e74 726f 6c3a 206e [ Cache-Control: n ]
  109. 00f0: 6f2d 7374 6f72 652c 206e 6f2d 6361 6368 [ o-store, no-cach ]
  110. 0100: 652c 206d 7573 742d 7265 7661 6c69 6461 [ e, must-revalida ]
  111. 0110: 7465 2c20 706f 7374 2d63 6865 636b 3d30 [ te, post-check=0 ]
  112. 0120: 2c20 7072 652d 6368 6563 6b3d 300d 0a50 [ , pre-check=0..P ]
  113. 0130: 7261 676d 613a 206e 6f2d 6361 6368 650d [ ragma: no-cache. ]
  114. 0140: 0a4c 6f63 6174 696f 6e3a 2069 6e64 6578 [ .Location: index ]
  115. 0150: 2e70 6870 3f6d 6f64 756c 653d 5573 6572 [ .php?module=User ]
  116. 0160: 7326 7061 7265 6e74 3d53 6574 7469 6e67 [ s&parent=Setting ]
  117. 0170: 7326 7669 6577 3d4c 6f67 696e 2665 7272 [ s&view=Login&err ]
  118. 0180: 6f72 3d31 0d0a 0d0a [ or=1.... ]
  119. [DEBUG] hydra_receive_line: waittime: 32, conwait: 0, socket: 5, pid: 1869
  120. [DEBUG] RECV [pid:1869] (0 bytes):
  121. [DEBUG] attempt result: found 0, redirect 1, location: index.php?module=Users&parent=Settings&view=Login&error=1
  122. [DEBUG] host=192.168.101.10 redirect=/index.php?module=Users&parent=Settings&view=Login&error=1 origin=/index.php?module=Users&action=Login
  123. [VERBOSE] Page redirected to http://:88/index.php?module=Users&parent=Settings&view=Login&error=1
  124. DEBUG_DISCONNECT
  125. DEBUG_CONNECT_OK
  126. [DEBUG] SEND [pid:1869] (245 bytes):
  127. 0000: 4745 5420 2f69 6e64 6578 2e70 6870 3f6d [ GET /index.php?m ]
  128. 0010: 6f64 756c 653d 5573 6572 7326 7061 7265 [ odule=Users&pare ]
  129. 0020: 6e74 3d53 6574 7469 6e67 7326 7669 6577 [ nt=Settings&view ]
  130. 0030: 3d4c 6f67 696e 2665 7272 6f72 3d31 2048 [ =Login&error=1 H ]
  131. 0040: 5454 502f 312e 300d 0a43 6f6f 6b69 653a [ TTP/1.0..Cookie: ]
  132. 0050: 2073 6563 7572 6974 793d 6d65 6469 756d [ security=medium ]
  133. 0060: 3b20 5048 5053 4553 5349 443d 3532 3433 [ ; PHPSESSID=5243 ]
  134. 0070: 3338 3031 3539 6138 3032 3665 3962 3931 [ 380159a8026e9b91 ]
  135. 0080: 650d 0a48 6f73 743a 203a 3838 0d0a 5573 [ e..Host: :88..Us ]
  136. 0090: 6572 2d41 6765 6e74 3a20 4d6f 7a69 6c6c [ er-Agent: Mozill ]
  137. 00a0: 612f 352e 3020 2848 7964 7261 290d 0a43 [ a/5.0 (Hydra)..C ]
  138. 00b0: 6f6e 7465 6e74 2d4c 656e 6774 683a 2030 [ ontent-Length: 0 ]
  139. 00c0: 0d0a 436f 6e74 656e 742d 5479 7065 3a20 [ ..Content-Type: ]
  140. 00d0: 6170 706c 6963 6174 696f 6e2f 782d 7777 [ application/x-ww ]
  141. 00e0: 772d 666f 726d 2d75 726c 656e 636f 6465 [ w-form-urlencode ]
  142. 00f0: 640d 0a0d 0a [ d.... ]
  143. [DEBUG] hydra_receive_line: waittime: 32, conwait: 0, socket: 5, pid: 1869
  144. [DEBUG] RECV [pid:1869] (323 bytes):
  145. 0000: 4854 5450 2f31 2e31 2034 3030 2042 6164 [ HTTP/1.1 400 Bad ]
  146. 0010: 2052 6571 7565 7374 0d0a 5365 7276 6572 [ Request..Server ]
  147. 0020: 3a20 6e67 696e 782f 312e 362e 320d 0a44 [ : nginx/1.6.2..D ]
  148. 0030: 6174 653a 2054 6875 2c20 3331 2041 7567 [ ate: Thu, 31 Aug ]
  149. 0040: 2032 3031 3720 3132 3a34 373a 3437 2047 [ 2017 12:47:47 G ]
  150. 0050: 4d54 0d0a 436f 6e74 656e 742d 5479 7065 [ MT..Content-Type ]
  151. 0060: 3a20 7465 7874 2f68 746d 6c0d 0a43 6f6e [ : text/html..Con ]
  152. 0070: 7465 6e74 2d4c 656e 6774 683a 2031 3732 [ tent-Length: 172 ]
  153. 0080: 0d0a 436f 6e6e 6563 7469 6f6e 3a20 636c [ ..Connection: cl ]
  154. 0090: 6f73 650d 0a0d 0a3c 6874 6d6c 3e0d 0a3c [ ose....<html>..< ]
  155. 00a0: 6865 6164 3e3c 7469 746c 653e 3430 3020 [ head><title>400 ]
  156. 00b0: 4261 6420 5265 7175 6573 743c 2f74 6974 [ Bad Request</tit ]
  157. 00c0: 6c65 3e3c 2f68 6561 643e 0d0a 3c62 6f64 [ le></head>..<bod ]
  158. 00d0: 7920 6267 636f 6c6f 723d 2277 6869 7465 [ y bgcolor="white ]
  159. 00e0: 223e 0d0a 3c63 656e 7465 723e 3c68 313e [ ">..<center><h1> ]
  160. 00f0: 3430 3020 4261 6420 5265 7175 6573 743c [ 400 Bad Request< ]
  161. 0100: 2f68 313e 3c2f 6365 6e74 6572 3e0d 0a3c [ /h1></center>..< ]
  162. 0110: 6872 3e3c 6365 6e74 6572 3e6e 6769 6e78 [ hr><center>nginx ]
  163. 0120: 2f31 2e36 2e32 3c2f 6365 6e74 6572 3e0d [ /1.6.2</center>. ]
  164. 0130: 0a3c 2f62 6f64 793e 0d0a 3c2f 6874 6d6c [ .</body>..</html ]
  165. 0140: 3e0d 0a [ >.. ]
  166. [DEBUG] hydra_receive_line: waittime: 32, conwait: 0, socket: 5, pid: 1869
  167. [DEBUG] RECV [pid:1869] (0 bytes):
  168. DEBUG_DISCONNECT[DEBUG] head_no[0] read F
  169. [88][http-post-form] host: 192.168.101.10 login: admin password: cat
  170.  
  171. [DEBUG] head_no[0] read n
  172. [STATUS] attack finished for 192.168.101.10 (waiting for children to complete tests)
  173. [DEBUG] head_no 0, kill 1, fail 0
  174. [DEBUG] all targets done and all heads finished
  175. [DEBUG] while loop left with 1
  176. 1 of 1 target successfully completed, 1 valid password found
  177. [DEBUG] killing all remaining children now that might be stuck
  178. Hydra (http://www.thc.org/thc-hydra) finished at 2017-08-31 14:47:32
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement