1 Reviews and Ratings
134 Reviews and Ratings
No answers on this topic
One scenario that fits well Hydra's ability is to test the strength of Drupal usernames and passwords. So, as an example, if we have a Drupal site at some HTTP web address, we could use lots of methods in order to collect a list with some valid users. After we create the list and also the list of some possible passwords we can try to initiate a Hydra brute force attack. Hydra for example is not suited for finding the vulnerabilities of a host, for this other solutions can be used.Incentivized
I don't know of any other tool that works as well as Wireshark for packet capture an inspection. It's extremely easy to get up and running, and even with little to no knowledge of how to use the tool, you can be looking at all the traffic coming off a network interface.Incentivized
One of most important thing is that Hydra's ability to perform HTTP post form attacks.The tool also can be used to attack a great number of protocols.The source code of the tool/software is also available for others (so it is not a closed source one).A good thing about this tool is also the support available and it also has a high ranking on GitHub (over 1000 stars).Incentivized
Light-weight software - Does not require high end specifications; also runs smoothly on Legacy systemsFilter function - Lets you filter you packets from thousands to tens so as to find your target much easilySimultaneous capturing on all the network adapters - You can capture packets from all the Network Interface Cards (NIC's) at once.
It is not a straightforward tool to use, it needs certain dependencies to be installed so it can function as intended by its creators. This is one of the most important steps that need to be done while configuring the tool as one needs.Sometimes the tool gives False Positives passwords.There are some issues in the functionality of the tool itself (like some bugs, for example affecting the running and hanging process after a number of tries), but most of them have a solution and there is big community support for the tool.Incentivized
A more user-friendly interface would be nice, but then again it is not really designed for those who are not quite comfortable with this type of software.Changes to functionality on updates - this can sometimes happen unexpectedly and can be an annoyance.More powerful data processing would be welcomedIncentivized
I give Wireshark a 10 for usability because it is very usable. Just about anyone can capture packets within a few seconds of opening the program. The analysis is a science but as far as just using Wireshark; it's very easy.Incentivized
I don't believe Wireshark has "true" support as the software is open source. However, there is an active & friendly community around Wireshark that are more than happy to help answer questions. From a comprehensive Wiki and FAQ section on the site to the Ask a Question forum and bug tracker section, there's plenty of support options to make sure your questions and issues are addressed.Incentivized
Simple and easy setup.Incentivized
There are many other tools similar to Hydra, one of them being "John the Ripper ". Notable differences are that while John the Ripper works offline, Hydra works online; also Hydra is more popular and with a wider usage as it supports Windows, Linux, and macOSX. An important thing is that both software are free to use, making both very useful tools. We can note that JTR has also a "pro" version that is not free to use and it is more optimized for speed and performance and focused on a specific operating system, while Hydra is free and offers all features at no cost.Incentivized
Wireshark is a free tool that came highly recommended by one of our former network security consultants. Using the tool he was able to resolve all of our higher tier network tickets, so we observed first hand why we needed to add Wireshark into our toolset. We received in-depth instruction and training scenarios that demonstrated the effectiveness and power of the product, so we didn't spend any time reviewing competing products.Incentivized
Our business objectives are accomplished using the tool as Hydra covers our needs for a free password cracking tool.The tool is a free one that has a lot of advantages because it is a powerful one to use for the specific task of performing some activities that are related to penetration testing.The services that our business provides for several clients in the field of penetration testing are at the level our customers are expecting.Incentivized
Identifying bugs in the network has never been smooth and near-perfect.Wireshark has made sure our equipment and software is working properly via analyzing network data.Analysis of IP packets and Sip call flaws has saved us a lot of time and confident result.Incentivized