I recently experimented with hacking Metasploitable 2 through SSH, Telnet, and FTP.
To hack Metasploitable 2, I first used Metasploit’s login modules in /auxiliary/scanner, such as “/ssh/ssh_login”, “/telnet/telnet_login”, and “/ftp/ftp_login”.
I then hacked Metasploitable 2 using Hydra in the same ways using the command: “hydra -L usernames.txt -P passwords.txt [Metasploitable 2’s IP] [ssh / telnet / ftp]”
And then I realized that while both Metasploit’s login modules and Hydra successfully worked, Hydra was always noticeably faster at attempting all usernames and passwords than Metasploit’s login modules.
I know this is a dumb question, but does anyone know why Hydra is faster than Metasploit’s SSH, Telnet, and FTP login modules?
(I apologize if my question is confusing. This is my first time posting on Reddit, and although I just posted this on AskNetsec sub, I thought this sub also had people who could answer my question.)