Medusa
Official Documentation: https://www.kali.org/tools/medusa/¶
Cheat Sheet: Medusa Commands¶
Purpose¶
Medusa is a parallel, modular login brute-forcer similar to Hydra, designed for speed and flexibility across many protocols.
Scenarios¶
- CTF: Rapidly test credentials against services in lab environments.
- Real world: Use in authorized penetration tests for credential stuffing or multi-service testing.
All needed info to run¶
- Target service and module (e.g.,
ssh,ftp,http). - Username/password lists.
- Common flags:
-h <host>→ target host-U <userlist>→ usernames file-P <passlist>→ passwords file-M <module>→ module/service name (e.g.,ssh)-t <threads>→ concurrent threads-f→ stop on first found login- Check
medusa -Hfor module list and syntax details.
Example commands & outputs¶
# SSH brute-force with medusa
$ medusa -h 192.168.56.101 -U users.txt -P passwords.txt -M ssh -t 8 -f
# Output snippet:
# SUCCESS: 192.168.56.101:22 ssh - login: root password: toor123
# FTP example
$ medusa -h 192.168.56.101 -U users.txt -P passwords.txt -M ftp
Medusa Basics
- Medusa is fast and parallel — set
-tcarefully to avoid overwhelming targets. - Use
-fto stop after a success and save time. - Modules differ in argument requirements; check medusa module docs.
- Only use Medusa on authorized targets and be mindful of lockouts.