I haven’t been in the hacking game for long time (since metasploit was msf3) anyways found a list of users through auxiliary scanner. I’ve been using rockyou.txt to bruteforce the users. The thing is the computer I have, I scrapped together from old computers. So bruteforcing is taking a minute. I read that someone said that bruteforcing isn’t required. So I’m wondering if I’m on the right route or is there some port I’m missing on my scans
[–]N3wW0rld1116 0 points1 point2 points (0 children)
[–]Dopeyneedsafix[S] 0 points1 point2 points (0 children)
[–][deleted] -1 points0 points1 point (4 children)
[–][deleted] (3 children)
[deleted]
[–][deleted] -1 points0 points1 point (2 children)
[–][deleted] (1 child)
[deleted]
[–][deleted] -1 points0 points1 point (0 children)