Exploiting an Ubuntu Machine

Let’s try a different exploit on an Ubuntu 9.04 virtual machine. The steps are pretty much the same as for the preceding exploit except that we will select a different payload.

msf > nmap -sT -A -P0
[*] exec: nmap -sT -A -P0

Starting Nmap 5.20 ( http://nmap.org ) at 2011-03-15 19:35 EDT
Warning: Traceroute does not support idle or connect scan, disabling...
Nmap scan report for
Host is up (0.00048s latency).
Not shown: 997 closed ports
80/tcp  open  http        Apache httpd 2.2.3 ((Ubuntu) PHP/5.2.1) 
|_html-title: Index of /
139/tcp open  netbios-ssn Samba ...

Get Metasploit now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.