Username Brute Force taking trillions of years

Hello everyone. I am doing the Hydra Username brute force module. Unfortunately I do not have a trillion years to spend here and I was wondering what it is I can do to maybe make this work out in a more realistic time frame.

hydra -L /usr/share/wordlists/rockyou.txt -P /usr/share/wordlists/rockyou.txt -u -f 83.136.252.24 -s 33886 http-post-form “/admin_login.php:username=^USER^&password=^PASS^:F=<form name=‘log-in’”/

is the code i have used & I’m wondering if someone can push me in the right direction to what’s wrong with my triggers

figured out why the code wasnt running but cant figure out why i can’t log into the page for flag

Are you on the Login Brute Forcing module and the Username Brute Forcing section?

i just figured it out! thank again though.

1 Like