当前位置:网站首页>Medusa installation and simple use
Medusa installation and simple use
2022-07-05 02:21:00 【Heyue Keyan】
medusa Installation and ease of use
1、 Compile and install manually medusa
yum install openssl-devel libssh2-devel -y # Install dependency packages
tar zxvf medusa-2.2.tar.gz
cd medusa-2.2/
./configure && make -j 4 && make install
2、medusa Parameter description :
-H [File] Include the target host name or IP The file of
-U [File] The user name file that contains the test
-p[File] Contains the password file for the test
-O[File] Log information file , Save the results of brute force cracking
-M[text] Module execution name
-t[num] Set the number of threads
-n[num] Use for non-default TCP port number Specify non 22 Port number , Default 22
3、 Blast ssh
Specify by file host and user,host.txt Is the target host name or IP Address ,user.txt Specify required burst Crack the user name , Use wordlist.txt Dictionary burst .
head -n 20 wordlist.txt > b.txt # take 20 A code , Put it in b.txt. If straight Use this dictionary , It took too long
echo 123456 >> b.txt # Write the correct password
echo 219.143.129.64 > /root/host.txt # Specified burst IP, A line of one .
vim /root/users.txt # Insert the following multiple users
medusa -M ssh -H ./host.txt -U ./users.txt -t 8 -P b.txt -O hack.log
After successful cracking, it will display success word , And put the result of the burst into hack.log in
边栏推荐
- Three properties that a good homomorphic encryption should satisfy
- I use these six code comparison tools
- The MySQL team development specifications used by various factories are too detailed. It is recommended to collect them!
- Visual studio 2019 set transparent background (fool teaching)
- Blue bridge - maximum common divisor and minimum common multiple
- Tla+ through examples (XI) -- propositional logic and examples
- Interpretation of mask RCNN paper
- Talk about the things that must be paid attention to when interviewing programmers
- PowerShell: use PowerShell behind the proxy server
- [機緣參悟-38]:鬼穀子-第五飛箝篇 - 警示之一:有一種殺稱為“捧殺”
猜你喜欢
【LeetCode】111. Minimum depth of binary tree (2 brushes of wrong questions)
Runc hang causes the kubernetes node notready
Win:使用 PowerShell 检查无线信号的强弱
Action News
He was laid off.. 39 year old Ali P9, saved 150million
The perfect car for successful people: BMW X7! Superior performance, excellent comfort and safety
JVM - when multiple threads initialize the same class, only one thread is allowed to initialize
Learn game model 3D characters, come out to find a job?
Stored procedure and stored function in Oracle
Official announcement! The third cloud native programming challenge is officially launched!
随机推荐
Summary and practice of knowledge map construction technology
Flutter 2.10 update details
Practical case of SQL optimization: speed up your database
100 basic multiple choice questions of C language (with answers) 04
PowerShell:在代理服务器后面使用 PowerShell
Mysql database | build master-slave instances of mysql-8.0 or above based on docker
JVM's responsibility - load and run bytecode
RichView TRVStyle MainRVStyle
Official announcement! The third cloud native programming challenge is officially launched!
Uniapp navigateto jump failure
Yyds dry inventory jetpack hit dependency injection framework Getting Started Guide
Educational Codeforces Round 122 (Rated for Div. 2) ABC
Naacl 2021 | contrastive learning sweeping text clustering task
使用druid連接MySQL數據庫報類型錯誤
Three properties that a good homomorphic encryption should satisfy
[Yu Yue education] National Open University spring 2019 0505-22t basic nursing reference questions
Write a thread pool by hand, and take you to learn the implementation principle of ThreadPoolExecutor thread pool
【附源码】基于知识图谱的智能推荐系统-Sylvie小兔
Pgadmin 4 V6.5 release, PostgreSQL open source graphical management tool
Comment mettre en place une équipe technique pour détruire l'entreprise?