Metasploitable by Rapid 7

Metasploitable by Rapid 7

A buggy VM can be exploit by Kali metasploit.


Start from nmap scan, acquire information on which port are open

First attack is on port 21, ssh. with :) in the end. Backdoor program will executed. Next telnet to port 6200, can direct login to Metasploitable.


This issuing irc vulnerability, can direct use metasploit to exploit. 

This is use ingreslock, directly use telnet to login system and have root privilege  

Using Samba system's vulnerability, metasploit can directly attack the system without install backdoor program 

留言

這個網誌中的熱門文章

惡意程式分析 - 常用工具篇

Offensive Security Certified Professional (OSCP) 滲透測試證照經驗分享

Offensive Security Certified Professional Review