attackers targeting legacy protocols with stolen credential dumps to increase the speed and efficiency of the brute force attacks. Based…