I found the name f****@*** in the nmap scan. I am now brute forcing FTP using the command below.
But it is taking hours with no end in sight.
Am I doing something wrong here?
╭─d@parrot attacking-common-services-lab-easy
╰─$ hydra -l f******@inlanefreight.htb -P /usr/share/wordlists/rockyou.txt ftp://10.129.203.7 -t 64
I am using the rockyou list since this was mentioned in some other threads. Apparently the lists in the lab resources will not work.