Exploiting an Ubuntu Machine
Let’s try a different exploit on an Ubuntu 9.04 virtual machine. The steps are pretty much the same as for the preceding exploit except that we will select a different payload.
msf >nmap -sT -A -P0 192.168.33.132
[*] exec: nmap -sT -A -P0 192.168.33.132 Starting Nmap 5.20 ( http://nmap.org ) at 2011-03-15 19:35 EDT Warning: Traceroute does not support idle or connect scan, disabling... Nmap scan report for 192.168.33.132 Host is up (0.00048s latency). Not shown: 997 closed ports PORT STATE SERVICE VERSION80/tcp open
http Apache httpd 2.2.3 ((Ubuntu
) PHP/5.2.1) |_html-title: Index of /139/tcp open
netbios-ssnSamba ...
Get Metasploit now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.