Hi guys,

Im new to Hydra password brute-forcing tool. I ran into the "warning:timeout from child ..." issues whenever I tried to brute force my router, eventhough after i tweaked the timeout and number of tasks :-

# hydra -V -l admin 192.168.1.1 -P thelist.txt -t 6 -w 80 ssh
Hydra v6.5 (c) 2011 by van Hauser / THC and David Maciejak - use allowed only for legal purposes.
Hydra (http://www.thc.org/thc-hydra) starting at 2011-11-20 10:18:11
[DATA] 6 tasks, 1 servers, 17965850 login tries (l:1/p:17965850), ~2994308 tries per task
[DATA] attacking service ssh on port 22
[ATTEMPT] target 192.168.1.1 - login "admin" - pass "stillegungen" - child 0 - 1 of 17965850
[ATTEMPT] target 192.168.1.1 - login "admin" - pass "liz11111" - child 1 - 2 of 17965850
[ATTEMPT] target 192.168.1.1 - login "admin" - pass "b4jose61" - child 2 - 3 of 17965850
[ATTEMPT] target 192.168.1.1 - login "admin" - pass "Monstro1" - child 3 - 4 of 17965850
[ATTEMPT] target 192.168.1.1 - login "admin" - pass "chromatic" - child 4 - 5 of 17965850
[ATTEMPT] target 192.168.1.1 - login "admin" - pass "bitched11" - child 5 - 6 of 17965850
[STATUS] 6.00 tries/min, 6 tries in 00:01h, 17965844 todo in 49905:08h
Warning: Timeout from child 0, restarting
Warning: Timeout from child 1, restarting
Warning: Timeout from child 2, restarting
Warning: Timeout from child 3, restarting
Warning: Timeout from child 4, restarting
Warning: Timeout from child 5, restarting


I tried the same command on my localhost ssh server and the warning alerts seems to go away :-

# hydra -V -l user 127.0.0.1 -P thelist.txt -t 6 -w 80 ssh
Hydra v6.5 (c) 2011 by van Hauser / THC and David Maciejak - use allowed only for legal purposes.
Hydra (http://www.thc.org/thc-hydra) starting at 2011-11-20 10:22:06
WARNING: Restorefile (./hydra.restore) from a previous session found, to prevent overwriting, you have 10 seconds to abort...
[DATA] 6 tasks, 1 servers, 17965850 login tries (l:1/p:17965850), ~2994308 tries per task
[DATA] attacking service ssh on port 22
[ATTEMPT] target 127.0.0.1 - login "admin" - pass "stillegungen" - child 0 - 1 of 17965850
[ATTEMPT] target 127.0.0.1 - login "admin" - pass "liz11111" - child 1 - 2 of 17965850
[ATTEMPT] target 127.0.0.1 - login "admin" - pass "b4jose61" - child 2 - 3 of 17965850
[ATTEMPT] target 127.0.0.1 - login "admin" - pass "Monstro1" - child 3 - 4 of 17965850
[ATTEMPT] target 127.0.0.1 - login "admin" - pass "chromatic" - child 4 - 5 of 17965850
[ATTEMPT] target 127.0.0.1 - login "admin" - pass "bitched11" - child 5 - 6 of 17965850
[ATTEMPT] target 127.0.0.1 - login "admin" - pass "brittlvscona" - child 0 - 7 of 17965850
[ATTEMPT] target 127.0.0.1 - login "admin" - pass "candyforj0sh" - child 4 - 8 of 17965850
[ATTEMPT] target 127.0.0.1 - login "admin" - pass "jaxon072301" - child 1 - 9 of 17965850
[ATTEMPT] target 127.0.0.1 - login "admin" - pass "ilche" - child 5 - 10 of 17965850
...


Does this mean i need a better wireless NIC card to do password cracking over the wireless network? /