Metasploitable Root shell 1524/tcp open shell Metasploitable root shell This was a curiousity… My first attempt was to attempt using rlogin to connect to the port, which did not appear to work correctly, though did seem to work enough to return part of a prompt to the user: root@kali:~# rlogin -p 1524 target oot@metasploitable:/# My next approach was to attempt a simple netcat connection to the host, which ended up being successful: root@kali:~# nc -v target 1524 root@metasploitable:/# id ...
Whatweb web pen-testing tools
- Type wahtweb see help configuration
- "whatweb-l" see list of all services
- "whatweb <url > " to see url information
- see the verbose of any sites "whatweb -v <url>
- whatweb -a 3 <url>
- or whatweb -a 4 <url > and so on it may in any no that will give ore info
Comments
Post a Comment