So now you have done your recon and found services and their versions. You have looked in every corner of the target. Enumerated subdomains, scanned them, browsed through the webpage looking everywhere.
So, now it is time to see if any of these services contains any vulnerabilites.
## Brute force
Anything related to brute force attacks can be found in the chapter **Password Cracking**
So, now it is time to see if any of these services contains any vulnerabilities.