Metasploitable by Rapid 7
Metasploitable by Rapid 7
A buggy VM can be exploit by Kali metasploit.
Start from nmap scan, acquire information on which port are open
First attack is on port 21, ssh. with :) in the end. Backdoor program will executed. Next telnet to port 6200, can direct login to Metasploitable.
This issuing irc vulnerability, can direct use metasploit to exploit.
This is use ingreslock, directly use telnet to login system and have root privilege
Using Samba system's vulnerability, metasploit can directly attack the system without install backdoor program
留言
張貼留言