Do some kind of social engineering to obtain the information about the guy you hate.
Also, do some port scanner with other utilities to obtain his ssh port like nmap scanner. Let say you have this info:
Pray that he did not have another layer of protection for his SSH connection like using publickey authentication or Bruteforce defender like fail2ban + firewall.
Next, close your curtain, your windows, turn off the light and wear cool black glasses. Then begin hacking the password with this command:
Turn on your system and in terminal type this:
Search on the internet common password list for bruteforce and download it. Example:
Do some kind of social engineering to obtain the information about the
guy
you hate. Also, do some port scanner with other utilities to obtain his ssh port like nmap scanner. Let say you have this info:Pray that he did not have another layer of protection for his SSH connection like using publickey authentication or Bruteforce defender like fail2ban + firewall.
Next, close your curtain, your windows, turn off the light and wear cool black glasses. Then begin hacking the password with this command:
If your common password is good enough and if you are using high-end computer, you could get his authentication in a few minutes at least.
Bruteforce is illegal. So only do this for testing system vulnerabilities.