HackTool - Hydra Password Bruteforce Execution

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects the execution of the Hydra password guessing tool based on command-line parameters that indicate brute-force password attacks.

Severity

Trouble

Rule journey

Attack chain scenario

Initial Access → Credential Access → Lateral Movement

Impact

Account compromise due to guessed or brute-forced passwords, enabling unauthorized access and lateral movement.

Rule Requirement

Prerequisites


Using Windows Event Viewer

  1. Log in to a domain controller with domain admin rights.
  2. Open Group Policy Management Console (GPMC) by typing gpmc.msc in the Run dialog.
  3. Create a new GPO or edit an existing one linked to the required OU.
  4. Navigate to:
    Computer Configuration → Policies → Windows Settings → Security Settings → Advanced Audit Policy Configuration → Audit Policies → Detailed Tracking
    • Enable Audit Process Creation (select "Configure the following audit events" and check Success)
    • Enable Audit Process Termination (same as above)
  5. To log command-line details:
    Go to: Computer Configuration → Administrative Templates → System → Audit Process Creation
    • Enable Include command line in process creation events
  6. Ensure the following registry key exists:
    Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\Microsoft-Windows-Security-Auditing\Operational

Using Sysmon

  1. Download and install Sysmon from Microsoft Sysinternals.
  2. Open Command Prompt as Administrator.
  3. Install Sysmon using a configuration file that includes process creation monitoring. Example configuration should contain:
    • A rule to log all process creation events (e.g., ProcessCreate with onmatch="exclude" to log everything).
  4. Ensure the following registry key exists:
    Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\Microsoft-Windows-Sysmon\Operational\

Criteria

Action1: actionname = "Process started" AND (COMMANDLINE contains "-u " AND COMMANDLINE contains "-p ") AND COMMANDLINE contains "^USER^,^PASS^" select Action1.HOSTNAME,Action1.MESSAGE,Action1.COMMANDLINE,Action1.FILE_NAME,Action1.PROCESSNAME,Action1.USERNAME,Action1.PARENTPROCESSNAME

Detection

Execution Mode

realtime

Log Sources

Windows

MITRE ATT&CK

T1110 – Brute Force
T1110.001 – Password Guessing

Security Standards

Implementation of account lockout policies, multi-factor authentication, strong password policies compliant with NIST guidelines, and user account management best practices.

Author

Vasiliy Burov

Future actions

Known False Positives

Software that uses caret-encased keywords such as PASS and USER in command lines may cause false detections.

Next Steps

  • Investigate occurrences of Hydra tool executions for unauthorized activity
  • Enforce and tune account lockout and conditional access policies
  • Deploy multi-factor authentication and strong password policies
  • Monitor authentication logs for brute-force patterns
  • Provide user training on password security and attack awareness

Mitigation

Mitigation ID

Name

Description

M1036

Account Use Policies

Set account lockout policies after a defined number of failed login attempts to prevent brute force password guessing attacks.

M1032

Multi-factor Authentication

Require multi-factor authentication on all accounts and externally facing services to reduce the risk of credential compromise.

M1027

Password Policies

Follow NIST guidelines for strong password policies, including complexity, length, and uniqueness to hinder brute force attacks.

M1018

User Account Management

Proactively reset accounts known to have breached credentials or after detecting brute force attempts to minimize impact.

M1051

Update Software

Keep authentication and management services up to date to incorporate latest security features and policy enforcement capabilities.