Metasploitable Root shell 1524/tcp open shell Metasploitable root shell This was a curiousity… My first attempt was to attempt using rlogin to connect to the port, which did not appear to work correctly, though did seem to work enough to return part of a prompt to the user: root@kali:~# rlogin -p 1524 target oot@metasploitable:/# My next approach was to attempt a simple netcat connection to the host, which ended up being successful: root@kali:~# nc -v target 1524 root@metasploitable:/# id ...
Zenmap
Zenmap is the official graphical user interface (GUI) for the Nmap Security Scanner. It is a multi-platform, free and open-source application designed to make Nmap easy for beginners to use while providing advanced features for experienced Nmap users.
Step 2:
Type IP ADDRESS into Target and you can Choose scan option according to You
I have Chosen Manually Default Intense scan
But You can choose anyone of these
Zenmap is the official graphical user interface (GUI) for the Nmap Security Scanner. It is a multi-platform, free and open-source application designed to make Nmap easy for beginners to use while providing advanced features for experienced Nmap users.
Step 2:
Type IP ADDRESS into Target and you can Choose scan option according to You
I have Chosen Manually Default Intense scan
But You can choose anyone of these
- Intense scan. Command: nmap -T4 -A -v <target> ...
- Intense scan plus UDP. ...
- Intense scan, all TCP ports. ...
- Intense scan, no ping. ...
- Ping scan. ...
- Quick scan. ...
- Quick scan plus. ...
- Quick traceroute.
Step 3 :
After Selecting one of the press scan button/option
pic1
Pic2
Pic3
Comments
Post a Comment