Pentesters: Is it common for bruteforce/ dictionary attacks, e.g. for SSH username enumeration, to be successful in the real-world pentests? [closed]

I am learning and practicing on vulnerable-by-design machines (vulnhub, metasploitable etc.). I found that this machine is running OpenSSH 7.5, and I tried a few exploits of Username enumeration from ExploitDB, which all ask for a wordlist… Continue reading Pentesters: Is it common for bruteforce/ dictionary attacks, e.g. for SSH username enumeration, to be successful in the real-world pentests? [closed]

I was scammed with a ransom / extorsion thing over Telegram. I have the Telegram username of the scammer. Can I do anything to strike back? [closed]

I am new here, my apologies if this is not the right place to ask.
In October last year, I was scammed (the stupidest way, I traded risky pictures with a girl from a dating app, this person then asked me for crypto payments, threatening to… Continue reading I was scammed with a ransom / extorsion thing over Telegram. I have the Telegram username of the scammer. Can I do anything to strike back? [closed]