Metasploitable 2 FTP Exploitation (vsftpd backdoor) SESSION 1

Metasploitable 2 has been released for a while I didn’t had a chance to use it . so I tried it today and I thought of writing  what I’m trying on metaploitable on the blog .

so I started with a simple PING nmap scan on the internal network to see what are the hosts which is running at the moment


Starting Nmap 6.01 ( http://nmap.org ) at 2013-03-04 08:47 EST
Nmap scan report for 192.168.1.1
Host is up (0.00093s latency).
MAC Address: D8:6H:4C:EA:BB:B1 (Tp-link Technologies Co.)
Nmap scan report for 192.168.1.100
Host is up.
Nmap scan report for 192.168.1.101
Host is up (0.00022s latency).
MAC Address: 00:64:BE:8M:YD:12 (Sony)
Nmap scan report for 192.168.1.102
Host is up (0.0010s latency).
MAC Address: 08:00:27:A2:76:F2 (Cadmus Computer Systems)
Nmap done: 256 IP addresses (4 hosts up) scanned in 3.48 seconds

Continue reading

Advertisements