This video walks you through the process of a brute force attack. With a list of usernames, passwords, an IP address, and a port number, see how the Hydra tool can help you become an authorized user.
- So let's take a look at…one particular method of how we can…start launching an attack.…Now, we've looked at a few tools,…and the idea is to look at a few more tools…so that you'll have more exposure…to the actual tools that you'll probably be using,…and you'll be tested on on the PenTest+ exam.…It's important that you not just sit…and watch each of these demos.…That you watch the demo,…understand what we're trying to do, and then you stop,…and you launch your own virtual…machine in your own lab, and try it yourself.…
It's very important that you actually…get these things under your fingers…because, on the test,…the expectation is that you've…done this before multiple times.…So it's very important that you follow along with us,…run the test, tweak it a little bit, make some changes,…and see what the impact of using…slightly different options might be.…All right, with that being said,…let's jump right in to a brute force attack…using one of the more popular tools.…We're going to be using the Hydra tool.…So let's take a look at that.…
This Total Seminars course covers the exam certification topics. For information on additional study resources—including practice tests, lab simulations, books, and discounted exam vouchers—visit totalsem.com/linkedin. LinkedIn Learning members receive special pricing.
This course was created by Total Seminars. We are pleased to offer this training in our library.
We are a CompTIA Partner. As such, we are able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please download these PDF instructions.