Network Service Brute Force Commands Collection #  Basic MySQL brute force< target> 
#  MySQL brute force with custom credentials< target> 
#  MySQL enum< target> 
#  MySQL users enum" mysqluser='root',mysqlpass='password'" < target> 
#  MySQL databases enum" mysqluser='root',mysqlpass='password'" < target> 
#  MySQL hashdump" username='root',password='password'" < target> #  MS SQL brute force< target> 
#  MS SQL empty password check< target> 
#  MS SQL xp_cmdshell command execution (requires credentials)" ipconfig" < target> 
#  MS SQL information gathering< target> 
#  MS SQL dump hashes< target> #  PostgreSQL brute force< target> 
#  PostgreSQL brute force with specific credentials< target> 
#  PostgreSQL info gathering< target> #  MongoDB brute force< target> 
#  MongoDB info gathering< target> 
#  MongoDB database list (no auth)< target> 
#  MongoDB database list (with auth)" mongodb-databases.username='admin',mongodb-databases.password='password'" < target> #  Redis brute force< target> 
#  Redis info gathering< target> 
#  Redis key enumeration< target> #  Cassandra brute force< target> 
#  Cassandra info gathering< target> #  Oracle SID enumeration< target> 
#  Oracle brute force< target> 
#  Oracle TNS version< target> #  AJP Tomcat brute force< target> 
#  Tomcat manager brute force (HTTP)< target> 
#  Tomcat default credentials check< target> #  WordPress brute force< target> 
#  WordPress user enumeration< target> #  Joomla brute force< target> #  Drupal brute force& name:^USER^& pass:^PASS^& op:Log+in < target> #  POP3 brute force< target> 
#  POP3 capabilities check< target> 
#  POP3 with specific credentials< target> #  IMAP brute force< target> 
#  IMAP capabilities< target> #  SMTP brute force< target> 
#  SMTP user enumeration< target> 
#  SMTP commands< target> #  SNMP brute force (community strings)< target> 
#  SNMP with custom communities list< target> 
#  SNMP information gathering (with known community)< target> 
#  SNMP system processes< target> #  SSH brute force< target> 
#  SSH host key enumeration< target> 
#  SSH authorized keys< target> #  SIP brute force< target> 
#  SIP methods enumeration< target> #  RDP brute force< target> 
#  RDP security check< target> #  FTP brute force< target> 
#  FTP anonymous login< target> 
#  FTP bounce (scan through FTP server)< ftp_target>  < scan_target> #  SMB brute force< target> 
#  SMB OS discovery< target> 
#  SMB security mode< target> 
#  SMB enum shares< target> 
#  SMB enum users< target> #  RTSP URL brute force< target> 
#  RTSP methods< target> #  XMPP brute force< target> 
#  XMPP info< target> #  IPMI brute force< target> 
#  IPMI version and cipher suites< target> #  LDAP brute force< target> 
#  LDAP search< target> 
#  LDAP rootDSE< target> #  DNS brute force subdomains< domain> 
#  DNS zone transfer< domain>  < target> #  Timing options (faster scans)#  Aggressive timing#  Insane timing (may cause unreliable results)#  Authentication options#  Output options#  Normal output to file#  XML output#  Grepable output#  Additional useful options#  Skip host discovery#  Version detection#  Aggressive scan (OS detection, version detection, script scanning, and traceroute)Creating Custom Wordlists #  Generate custom wordlist from website#  Extract words from files in current directory" \w\{5,\}" .  |  sort -u >  wordlist.txt
#  Generate username variations>  usernames.txtAdvanced Brute Force with Hydra #  HTTP POST form< target>  http-post-form " /login.php:username=^USER^&password=^PASS^:F=Login failed" #  SSH< target>  ssh
#  FTP< target>  ftp
#  MySQL< target>  mysql
#  RDP< target>  rdp