

Read in a list of passwords ( -i /usr/share/wordlists/nmap.lst) and save to a file ( -o /root/passes.txt), selecting passwords of a minimum length of 6 ( -m 6) and a maximum length of 10 ( -M 10): :~# pw-inspector -i /usr/share/wordlists/nmap.lst -o /root/passes.txt -m 6 -M 10

Hydra v7.6 (c)2013 by van Hauser/THC & David Maciejak - for legal purposes only DARK Tool Documentation: hydra Usage ExampleĪttempt to login as the root user ( -l root) using a password list ( -P /usr/share/wordlists/metasploit/unix_passwords.txt) with 6 threads ( -t 6) on the given SSH server ( ssh://192.168.1.123): :~# hydra -l root -P /usr/share/wordlists/metasploit/unix_passwords.txt -t 6 ssh://192.168.1.123
