Metasploitable Root shell 1524/tcp open shell Metasploitable root shell This was a curiousity… My first attempt was to attempt using rlogin to connect to the port, which did not appear to work correctly, though did seem to work enough to return part of a prompt to the user: root@kali:~# rlogin -p 1524 target oot@metasploitable:/# My next approach was to attempt a simple netcat connection to the host, which ended up being successful: root@kali:~# nc -v target 1524 root@metasploitable:/# id ...
Zip a folder by terminal
- Frist you need to install zip tool if you are using Kali Linux zip tool is pre install so you don't need to install to zip tool ...
- if you are using Debian Linux "apt-get install zip "
- see help configure..
- zip a file or zip of any data
type "zip <name of zip> <name of data and its loacaton>"
- create an encrypted zip by terminal
command is
zip -e <name of zip file > <data you want to encrypt>
e=enrypt
where pass is a name of the zip file and
pass1.txt is the name of data or file
it ask password and ask to confirm
it ask password and ask to confirm
Comments
Post a Comment