I recently experimented with hacking Metasploitable 2 through SSH, Telnet, and FTP.
To hack Metasploitable 2, I first used Metasploit's login modules in /auxiliary/scanner, such as "/ssh/ssh_login", "/telnet/telnet_login", and "/ftp/ftp_login".
I then hacked Metasploitable 2 using Hydra in the same ways using the command: "hydra -L usernames.txt -P passwords.txt [Metasploitable 2's IP] [ssh / telnet / ftp]"
And then I realized that while both Metasploit's login modules and Hydra successfully worked, Hydra was always noticeably faster at attempting all usernames and passwords than Metasploit's login modules.
I know this is a dumb question, but does anyone know why Hydra is faster than Metasploit's SSH, Telnet, and FTP login modules?
(I apologize if my question is confusing. This is my first time posting on Reddit, and I thought this sub had people who could answer my question.)