Skip to main content

Explot Metasploitable Root shell

                             Metasploitable Root shell 1524/tcp             open                 shell              Metasploitable root shell This was a curiousity… My first attempt was to attempt using rlogin to connect to the port, which did not appear to work correctly, though did seem to work enough to return part of a prompt to the user: root@kali:~# rlogin -p 1524 target oot@metasploitable:/# My next approach was to attempt a simple netcat connection to the host, which ended up being successful: root@kali:~# nc -v target 1524 root@metasploitable:/# id              ...

DNS Enumeration with Metasploit

                             DNS Enumeration with Metasploit


msf auxiliary(scanner/smtp/smtp_enum) > use auxiliary/gather/enum_dns
msf auxiliary(scanner/smtp/smtp_enum) >show option
msf auxiliary(gather/enum_dns) > set DOMAIN 192.168.1.5
msf auxiliary(gather/enum_dns) > run




You can modify more .

msf auxiliary(dns_enum) > set ENUM_AXFR false
ENUM_AXFR => false
msf auxiliary(dns_enum) > set ENUM_SRV false
ENUM_SRV => false
msf auxiliary(dns_enum) > set ENUM_STD false
ENUM_STD => false
msf auxiliary(dns_enum) > set ENUM_RVL true
ENUM_RVL => true



 msf auxiliary(dns_enum) > set ENUM_BRT true
ENUM_BRT => true
msf auxiliary(dns_enum) > set ENUM_STD false
ENUM_STD => false
msf auxiliary(dns_enum) > run



msf auxiliary(dns_enum) > set DOMAIN hp.co
DOMAIN => hp.co
msf auxiliary(dns_enum) > run


 
                                                                   by Er. SANJAY KUMAR
                                                                   sanjayyadav11210@gmail.com

Comments