There are a ton of wordlists all over the web. Just Google "wordlist."
LT, you have the username, now you need the password. You can use a tool to brute-force / dict attack the SSH daemon. You can also write your own tool using Perl and the Net::SSH::Perl library. There are also a few SSH vulnerabilities, one particularly juicy one, that you can exploit. A Google search will reveal these.
Take your time, Google, research, and really understand what you are trying to accomplish.