

We will use Crunch as we had learned in an earlier guide to generating the lists required. We first need to have a word list and a password list which we will use when brute forcing the login page. Hydra -L -P 172.17.0.2 http-post-form "/login.php:username=^USER^&password=^PASS^&Login=Login:Login failed" -V

For this guide, we recommend using the locally or own hosted websites to practice penetration testing. Performing brute force attacks on login forms without obtaining the consent of the owner is a criminal offense and it is punishable by law.
