The telnet_login module will take a list of provided credentials and a range of IP addresses and attempt to login to any Telnet servers it encounters.
This module will test a telnet login on a range of machines and report successful logins. If you have loaded a database plugin and connected to a database this module will record successful logins and hosts so you can track your access.
Step 1 : This is msfconsole. Msfconsole is the main interface to MetaSploit. There are GUI interfaces (armitage), and a web interface too (websploit). With msfconsole, you can launch exploits, create listeners, configure payloads etc.
Step 2 :search telnet_login
Step 3 :This auxiliary module allows you to pass credentials in a number of ways. You can specifically set a username and password, you can pass a list of usernames and a list of passwords for it to iterate through, or you can provide a file that contains usernames and passwords separated by a space. We will configure the scanner to use a short usernames file and a passwords file and let it run against our subnet.
use auxiliary/scanner/telnet/telnet_login
Step 4 : Create a randomly User.txt and Password.txt file for brute force attack.
set STOP_ON_SUCCESS true
set RHOSTS 192.168.69.131
set USER_FILE /root/Desktop/User.txt
set PASS_FILE /root/Desktop/Password.txt
Step 5 : Run it.
Step 6 : You have Successfully Hacked Brute Force Telnet Login !!!
Step 7 :Great Now you have a session of webserver using telnet Login (23 Port).