By the end of this section, you will be able to:
● Perform a brute-force attack on a Telnet service using Kali Linux.
● Identify valid login credentials for the Core switch.
● Use the compromised access to pivot and extract credentials from the Metasploitable server.
● Understand the risks of weak authentication mechanisms in network devices.
In this exercise, you will:
● Target the Telnet service using a wordlist of common usernames and passwords.
● Once access is gained, explore the switch’s configuration or routing table to locate the Metasploitable server.