HackerOne is a hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be exploited, from the company of the same name in San Francisco. The service is used for vulnerability location, pen testing, bug bounty, and vulnerability triage services.
N/A
Hydra
Score 9.0 out of 10
N/A
Hydra is a password cracking tool used for penetration testing.
N/A
Pricing
HackerOne
Hydra
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
HackerOne
Hydra
Free Trial
No
No
Free/Freemium Version
No
No
Premium Consulting/Integration Services
No
No
Entry-level Setup Fee
No setup fee
No setup fee
Additional Details
For more information please email www.hackerone.com/contact or find us on the AWS Marketplace: https://aws.amazon.com/marketplace/seller-profile?id=10857e7c-011b-476d-b938-b587deba31cf
It is one of the good platforms for security researchers to submit bugs and other vulnerabilities, it however, has some challenges, in terms of un-verified and duplicate submissions.
One scenario that fits well Hydra's ability is to test the strength of Drupal usernames and passwords. So, as an example, if we have a Drupal site at some HTTP web address, we could use lots of methods in order to collect a list with some valid users. After we create the list and also the list of some possible passwords we can try to initiate a Hydra brute force attack. Hydra for example is not suited for finding the vulnerabilities of a host, for this other solutions can be used.
A lot of duplicate bugs get reported, although it does offer automatic suggestion of previously reported bugs that may be duplicates, it is far from perfect.
Anyone can report bugs, a lot of them are not verified before submission. This sometimes leads to a lot of time spent in verifying if the bug is really actionable.
Each submission has to be treated with equal potential, a lot of time, some time gets invested in vulnerabilities that aren't as important as some others.
It is not a straightforward tool to use, it needs certain dependencies to be installed so it can function as intended by its creators. This is one of the most important steps that need to be done while configuring the tool as one needs.
Sometimes the tool gives False Positives passwords.
There are some issues in the functionality of the tool itself (like some bugs, for example affecting the running and hanging process after a number of tries), but most of them have a solution and there is big community support for the tool.
These were very close and we liked HackerOne better. For a time we did have both and we felt the need to consolidate the information into one platform and end of life our internal offering. Overall we've been fairly happy with HackerOne.
There are many other tools similar to Hydra, one of them being "John the Ripper ". Notable differences are that while John the Ripper works offline, Hydra works online; also Hydra is more popular and with a wider usage as it supports Windows, Linux, and macOSX. An important thing is that both software are free to use, making both very useful tools. We can note that JTR has also a "pro" version that is not free to use and it is more optimized for speed and performance and focused on a specific operating system, while Hydra is free and offers all features at no cost.
Our business objectives are accomplished using the tool as Hydra covers our needs for a free password cracking tool.
The tool is a free one that has a lot of advantages because it is a powerful one to use for the specific task of performing some activities that are related to penetration testing.
The services that our business provides for several clients in the field of penetration testing are at the level our customers are expecting.