4.6 Target 6
Initially, we tried to get into target 6 in the same way as target 9, by using the login information using target 9. The username bob was denied however, so we tried exploiting other ports on this machine. Nothing was working with the Metasploit exploits, so we tried a username enumeration attack that eventually returned no results. So while we had the “secret word”, we had no user to use it with, and failed.