# Triggering detections for testing purposes

When installing or demonstrating appliances it can be useful to trigger detections. Triggering a detection in a monitored network proves that the appliances are installed correctly, that the sensor is communicating with the brain and that packet capture is set up correctly for the test workstations.

### Cryptocurrency Mining Detection

These curl commands trigger BitCoin mining detection:

```language-markup
curl -A "cpuminger" http://www.google.com
curl -A “cgminer” www.google.com
```

* Please note: For this to work properly, HTTP traffic must be visible to the Vectra Sensor. If you are using a web proxy client, such as Zscaler, it may not function properly.

The same commands as above, but using PowerShell:

```language-markup
powershell.exe Invoke-WebRequest "http://google.com" -UserAgent "cpuminger" -UseBasicParsing
powershell.exe Invoke-WebRequest "http://google.com" -UserAgent "cgminer" -UseBasicParsing
```

Another option for PowerShell:

```language-markup
curl -UserAgent "cpuminger" http://www.google.com
```

### Brute-Force Detection

This 'hydra' command (part of the Kali Linux distribution) generates a Brute-Force detection. Ensure you are using a current version of hydra.

First, you should uncompress the rockyou wordlist.

```language-markup
sudo gunzip /usr/share/wordlists/rockyou.txt.gz
```

Then, you can launch hydra using the rockyou wordlist.

```language-markup
hydra -l vectra -P /usr/share/wordlists/rockyou.txt ssh://10.1.0.50 –v
```
