Metasploitable Root shell 1524/tcp open shell Metasploitable root shell This was a curiousity… My first attempt was to attempt using rlogin to connect to the port, which did not appear to work correctly, though did seem to work enough to return part of a prompt to the user: root@kali:~# rlogin -p 1524 target oot@metasploitable:/# My next approach was to attempt a simple netcat connection to the host, which ended up being successful: root@kali:~# nc -v target 1524 root@metasploitable:/# id Written By Sanjay kumar https://www.instagram.com/sanjayer111/ https://www.facebook.com/mang786 https://www.linkedin.com
Exploit and connect to port 512 ,513, and 514 ༄ Unix Basics TCP ports 512, 513, and 514 are known as "r" services, and have been misconfigured to allow remote access from any host (a standard ".rhosts + +" situation). To take advantage of this, make sure the "rsh-client" client is installed (on Ubuntu), and run the following command as your local root user. If you are prompted for an SSH key, this means the rsh-client tools have not been installed and Ubuntu is defaulting to using SSH. 🔂 Step-1: First type "nmap -v <victim ip>" 🔄 Step-2: type "rlogin -l <user account> <ip address of victim> by Er. SANJAY KUMAR sanjayyadav11210@gmail.com