Rephrasing the equation

If you are scratching your head after working on the module listed previously, let's understand the module in a step-by-step fashion:

  1. We've created a CredentialCollection object that takes any user as input and yields credentials, which means that if we provide USERNAME as the root and PASSWORD as the root, it will yield those as a single credential. However, if we use USER_FILE and PASS_FILE as dictionaries, then it will take each username and password from the dictionary file and will generate credentials for each combination of username and password from the files, respectively.
  2. We've created a scanner object for SSH, which will eliminate any manual command usage and will simply check all the combinations we supplied ...

Get Mastering Metasploit - Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.