We interview the inventor, developer of THC Hydra! [Password Hacking Tool]


THC Hydra IS The Hacker’s Hacking Tool For Password Cracking!

Posted by Henry Dalziel  |  December 16, 2019  |   Questions / Comments 0

We interview the inventor, developer of THC Hydra! [Password Hacking Tool]

Cybersecurity Hacker Tool
Henry Dalziel
Henry Dalziel | December 16, 2019

- C|EH, Security+, MSc Marketing Management;
- Based in Hong Kong for the last five years;
- Cybersecurity Pro & Growth Hacker

TL;DR
We interview the developer of THC Hydra...

What will I learn from this interview?
We are really excited to post this!

We interviewed ‘THC Hydra’ creator, Marc “van Hauser” Heuse, and asked him a bunch of questions about his much-loved and used password hacking tool, THC Hydra, as well as other ‘career-starting’ questions.

As a way of background to this interview – we’ve been publishing tons of content on hacking tools for years now, and we’ve done a bunch of video interviews which you can see here. We thought it would be a great idea to continue with these ‘interview theme’, especially since we feel that such resources benefit younger people looking to increase their skills and subsequently find work in cyber security. By reading this post you will learn how Marc “van Hauser” Heuse developed Hydra, and why – and also tips and ways to get your tool out there!

 

What is THC Hydra?
THC Hydra (gitub) is one of the tools we all love. THC (The ‘Hacker’s Choice) password cracking tool has a legendary status – mostly because of its’ awesomeness at being able to act as a login cracker which supports numerous protocols to attack. Most users would agree that ‘Hydra’ is an easy tool to use and a highly efficient brute-force weapon.



The Interview: July 21, 2016

Henry, Concise
THC Hydra is awesome. How did you get the inspiration behind developing Hydra? What prompted your research? Said another way, where did you see the vulnerability that was most plausible to attack with regards to (multi-threaded) network logon cracking?

Marc “van Hauser” Heuse, THC Hydra
I was unsatisfied that at this point only tools exist to try login/ passwords against a single service – like telnet, ftp, pop3 etc. and every tool, of course, having different command-line options. So I had the idea to create one tool that supports multiple protocols and no need anymore for any other tool and easy usage.

Then I went to DEFCON (first time), and met Fyodor, the Nmap programmer, who had been a friend for some time until then. We were in his hotel room, one other person was there too, talked about ideas etc and realized that we all three had the same idea! So I realized I had to be fast and just a few weeks later I had a prototype. As I was first, Fyodor and the other guy did not follow up with a tool of their own. Many years later Fyodor tried with the Summer of Code event to get ncrack running, which was actually quite nice but was not followed up with support. So hydra is still the main tool available. Medusa is great too though – but also seems to be not supported anymore.

Henry, Concise
You’ve developed a bunch of security tools, namely, hydra, amap, thc-ipv6, THC-Scan, secure_delete, SuSEfirewall and many more. What is your preferred language to use when developing a tool?

Marc “van Hauser” Heuse, THC Hydra
Depends on the tool type and how it is to be deployed. I usually code in C, Perl and bash. So far there was no need to switch to Python or Go.

Henry, Concise
For all those budding security developers out there trying to create tools, how do you recommend they promote their work? Perhaps presenting research at conferences? Any other ways?

Marc “van Hauser” Heuse, THC Hydra
This is actually difficult. There a tons of tools, many of them accomplishing the same in just a little bit different way.

First – make it accessible for contribution, e.g. via github.
Second – encourage people to join your project: be friendly and helpful.
Third – actually use your own tool. find bugs: see what new features would help and report on your success
Fourth – support your tool as long as possible; do not drop it because you now have different interests
Fifth – Have more than one great tool


In summary
We’d like to thank Marc “van Hauser” Heuse for his time and wish him and the development all the best luck for the future!

THC Hydra, as well as other ‘career-starting’ questions.

As a way of background to this interview – we’ve been publishing tons of content on

We interviewed ‘THC Hydra’ creator, Marc “van Hauser” Heuse, and asked him a bunch of questions about his much-loved and used password hacking tool, THC Hydra, as well as other ‘career-starting’ questions.

As a way of background to this interview – we’ve been publishing tons of content on hacking tools for years now, and we’ve done a bunch of video interviews which you can see here. We thought it would be a great idea to continue with these ‘interview theme’, especially since we feel that such resources benefit younger people looking to increase their skills and subsequently find work in cyber security. By reading this post you will learn how Marc “van Hauser” Heuse developed Hydra, and why – and also tips and ways to get your tool out there!

Leave a Question or Comment:

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Some Of Our Other Content

You may also like...

USB Keyloggers
USB Keyloggers

Some of these USB Keyloggers work over WiFi and others even email you the keystrokes! Require NO drivers. Just plant and forget.

Blog Post

N00b Hacking
WiFi Hacking Hardware Devices
WiFi Hacking Hardware Devices

We take a look at hardware used by the pro's to hack into Wireless Networks! (Keyloggers, Deauth Tools, Alfa Scanner etc.)

Blog Post

WiFi Hacking
Mobile Encryption Apps
Mobile Encryption Apps

Is WhatsApp safe? What about Telegram? There are dozens of mobile encryption apps...

List Review

Cyber Hacking
Password Cracking Tools
Password Cracking Tools

John The Ripper, Crowbar, L0phtcrack, Medusa, Rainbowcrack, THC Hydra and more!

List Review

Cyber Hacking
Kali Linux Developers
Meet The Kali Linux Developers

Meet the folks behind the Hacking Tools that make Kali Linux so damn awesome

Blog Post

N00b Hacking
OSCP Advice
How Difficult is OSCP? Get expert advice from those that passed!

We've interviewed over 25 Cybersecurity Professionals to ask them that exact question...

Blog Post

N00b Hacking
How To Hack WordPress 2020
How To Hack WordPress 2020

In this (constantly updated) resource we investigate ways to Hack WordPress

Blog Post

N00b Hacking
Pass CEH First Time
Pass CEH First Time: we ask experts in the field

Are you interested in passing CEH? If yes, read on, we have a ton of advice to share

Blog Post

N00b Hacking