What is Hacking?

Using software or systems in ways that they were not designed to be used. 

  • Overt use is the designed purpose
  • Covert use is other than the designed use

Hydra = Brute force for 


hydra -l user.txt -P passlist.txt ftp

  • try a list of users against the server

firefox in Kali, change network setting at bottom of preferences

Start Burp Suite, turn off interceptor under poxy

Start metasploite by typing msfconsole

search vnc_login

use auxiliary/scanner/vnc/vnc_login

set rhosts

run (or exploit)


the password is password