Too Long; Didn't Read
This is a simple brute force method to connect to a Unix machine using SSH in our pentesting lab. The target machine, a Raspberry Pi running the Kali Linux OS is up-to-date and no other changes were made to the operating system. The success of this exploit is banking on the fact that admins do not change the default login credentials. We are using common default usernames and passwords for this exploit. We need to set up some files and configure Metasploit to exploit the Raspberry Pi victim’s server.