Nathan: Fellas, this is the new member of our class. His name is ****.
John: Bro, I'm John. Welcome to us!
****: Nice to meet you, bro.
Thomas: I'm Thomas, bro. Nice to meet you.
****: Nice to meet you too, bro.
Edward: I'm Edward, bro. I hope we get along well.
****: I hope so too, bro.
William: Yo, bro! Welcome to us. You look familiar; have we met before?
****: I don't know, bro. Maybe. Nice to meet you.
**** meets the other class members.
****: So, guys, how are the classes? Boring or good?
Edward: No, no! The classes are fun. We usually play games. You should join us!
****: What games do you play?
Edward: Fortnite.
****: I don't know; maybe I'll join. Fortnite is a great game. I play it sometimes.
William: Come on, bro! We'll have a blast playing together.
****: We'll see, bro.
Just then, Mr. Philip enters the classroom.
Mr. Philip: How are you doing, kids?
Nathan: We're good, sir. How about you?
Mr. Philip: I see some new faces in class.
Nathan: Yes, sir. **** just joined us.
Mr. Philip: Welcome, ****. You can choose any computer you want.
****: Alright, Mr. Philip.
Nathan: Bro, come over here; this one is empty.
****: Okay.
**** chooses the computer next to Nathan and sits down.
Mr. Philip: Anyway, kids, today we're going to learn about brute force attacks.
(Are they just learning this? I was a total newbie when I learned about this.)
****: Mr. Philip, I already know about that.
Mr. Philip: How do you know?
****: I learned about it some time ago.
Mr. Philip: Alright, I'll ask you questions while I explain.
****: Sure thing, Mr. Philip.
Nathan: Bro, you know a lot.
****: We know a thing or two, bro.
Mr. Philip: A brute force attack is when you systematically try all possible passwords to gain access to an account or an email—basically, any authenticated system.
Thomas: What's the purpose, Mr. Philip?
Mr. Philip: The goal is to gain access to the system. If one password is correct, you can easily enter the account.
William: Are we going to try this, Mr. Philip?
Mr. Philip: Yes, we'll learn how to do it and then try to access some places.
William: Alright, Mr. Philip.
Mr. Philip: Now, let's discuss how to do this. First, we need to identify the target. Our target will be systems that work with HTTP POST. These HTTP POST systems are like login systems.
(This sounds so boring; I don't want to deal with this. It's way too simple.)
Mr. Philip: Now it's time to choose the tool. We'll be using Hydra.
[30 minutes later]
The bell rings.
Mr. Philip: See you in the next class, kids.