User blog comment:SamwiseFilmore/Anyone want to get Hacked?/@comment-25101690-20170428200747

What are your techniques? Scanning for weak interfaces, trying out standard passwords, brute forcing unlimited password interfaces...?