Can you train a hydra after using Charm Monster?

So my plucky halfling street performer bard is whisked away to a magical land and lands in a tropical beach. A six-headed hydra assails the party from the surf. In response, my halfling softens it up with a dirge of doom and successfully enchants it with Charm Monster. I’m level 10, so in theory it is now a nice, friendly hydra for ten days.

So, the question: Can I use Handle Animal or any other mechanic to domesticate the beast and get me a pet-six headed hydra?

How would three level tens fare against a CR 14 False Hydra

I’m currently writing a one-shot adventure to run with my friends that has a false hydra as the final boss. I found the stat sheet for it here I’m planning on using the adult form with only three heads. Do you think that this thing is beatable with this party? Or will I need to bump it down a notch?

Hydra from Kali Linux Question

I have a question about Hydra, there is a page where the user is a number and the password is the last 4 digits of that number, I need to know if there is an option or a way to automate it with Hydra and not have to be entering 1 by one. Like -u option but with the users and passwords. PD: (Sorry for my bad English).

i need help with the hydra command

Can anyone help me regarding this command hydra -s 80 -l admin -P /root/Desktop/wl/cctvpass.txt -e ns -t 16 http-post-form Hydra v9.0 (c) 2019 by van Hauser/THC – Please do not use in military or secret service organizations, or for illegal purposes. After I executed the command this is what came out Hydra ( starting at 2020-09-11 15:58:42 [WARNING] You must supply the web page as an additional option or via -m, default path set to / [ERROR] the variables argument needs at least the strings ^USER^, ^PASS^, ^USER64^ or ^PASS64^: (null) I start at hydra and try to learn

Trying to create code on Hydra but i couldn’t

I am trying to use hydra with this code I used burp suite to read

POST /login.spy HTTP/1.1 Host: xxxxxxxxxxxxxxxxxxxxx User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Referer: xxxxxxxxxxxxxxxxxxx Content-Type: application/x-www-form-urlencoded Content-Length: 31 Origin: xxxxxxxxxxxxxxxxx Connection: close Cookie: __utma=4359724.2017361227.1568648782.1597586375.1597606273.4; __utmz=4359724.1597586258.2.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); spyceSession=2187_155964; __utmb=4359724; __utmc=4359724 Upgrade-Insecure-Requests: 1  postback=true&nm=§ewgw§&pw=§wefwef§ 

the code I did was hydra -l user -p password xxxxx "/login.spy:nm=^USER^&pw=^PASS^:Incorrect password" -f

the code runs but the password and user are all correct and it tells me 0 valid passwords

can I get help please am I missing something or not including the cookies in the code?

is there any way for hydra to understand the?

is there any way for hydra to understand the correct combination ^USER^ and ^PASS^ in a http-post-form authentication attack based on the length of the body response?

Like in Burpsuite you can look at the length and understand password and username.For username jack, the found password is 12345678 based on the different length of the response

ar 15 build kit

hydra brute force http-post-form

i know with hydra HTTP post form to success u have to insert error message when the password is wrong.

but in my case, i don’t have an error message, i have a redirection to page if error ..

how to solve the problem ?

login: /admins/

success: /admins/index.php

error: /my_account

this is the scenario …. how to solve my problem ?