Web path scanner
python
security
scanner
hacking
bruteforce
wordlist
penetration-testing
brute-force
bug-bounty
fuzzing
infosec
pentesting
fuzzer
brute
appsec
hacking-tool
dirsearch
dirbuster
scanner-web
bruteforcer
-
Updated
Jan 1, 2021 - Python
Hi All,
So I'm trying to use hydra to bruteforce a login on a system that uses custom http headers to receive the username and password. Hydra does not seem to be doing substitution of ^USER^ and ^PASS^ when used as HTTP headers. If I issue issuing a call to hydra like this:
hydra "http-post://0.0.0.0:8000/:H=username\:^USER^:H=password\:^PASS^" -l admin -p adminI see the following r