This can be used to test default password combinations on the services via the dictionary attack:
- We use the creds command to run the dictionary attack on various services:
use creds/telnet_bruteforce
The following screenshot shows the output of the preceding command:

- Next, we look at the options:
show options
The following screenshot shows the output of the preceding command:

- Now we set the target IP:
set target x.x.x.x
- We let it run, and it will show us any login it finds.
