This set of challenges will help users learn how to perform brute force attacks.
To access this challenge you have to SSH into the container. You can do this with Terminal, Command Prompt, Powershell, or even Secure Shell App for Google Chrome.
Non-target system login information:
ssh firstname.lastname@example.org -p 32773