Csol 570
Csol 570
Csol 570
Sabrina Toubbeh
CSOL 570
2 August 2021
Overview
This week’s assignment will cover Metasploitable 2 and exploiting the purposefully
built-in weaknesses of the virtual machine (VM). I will be following the Rapid 7 tutorial on
Metasploitable to execute this lab. The first section of this assignment will go over the
vulnerability exploits found and how they were discovered. The second section will simply show
the history of commands used within Kali Linux that demonstrate successful exploits.
After reading the entire Rapid 7 tutorial before starting, I went ahead and downloaded all
the required tools that are needed in this lab. I ran “apt-get install rsh-client”, “apt-get install
Following the guide, we login into metasploitable and run ifconfig to get our IP address.
Next, we go into Kali and run NMAP on the IP address 192.168.56.237 to see what open ports
are vulnerable.
After discovering attack vectors, we run rlogin -l root 192.168.56.237 command (which
required installation of the rsh-client). This gave us remote access into root on Metasploitable OS
being made. Then by running showmount -e 192.168.56.237 we can see the root directory being
exported.
Next, we generate a SSH key on our system and output the contents of our public key pair into
The telnet backdoor requires a user to login with a username that ends in ‘:)’ After entering the
letters “AB” followed by a system command to the server on any listening port. I was able to
connect to Metasploitable on port 6667 by the UnrealRCD IRC daemon. The guide does not
show the steps, but I had to set LHOST and payload before exploiting.
There is also a backdoor known as “ingreslock” backdoor that listens on port 1524. Once you get
The service distccd is running on Metasploitable OS and is a backdoor by nature. The program
makes it easy to scale large compiler jobs. Unfortunately, this service can be easily abused by an
attacker in which they can run a command of their choice. I will go ahead and use the
Metasploitable toolset that has the exploit script ready to use. I got the same error as before and
Another unintentional backdoor is the Samba filesharing client that can be used to access files
that were not meant to be shared. I am going to use the Metasploitable module to gain root
After exploiting samba, I got access to the root filesystem using an anonymous connection and a
writable share.
Vulnerable Web Services
Metasploitable has deliberate vulnerable web applications. You can access it by opening a web
This is the history of some of the commands I used to complete this exercise. There a few
rpcinfo -p192.168.56.237
showmount -e 192.168.56.237
ssh-keygen
mkdir /tmp/r00t
mount -t nfs 192.168.56.237//tmp/r00t/
unmount /tmp/r00t/
telnet 192.168.56.237 21
msfconsole
References
https://docs.rapid7.com/metasploit/metasploitable-2-exploitability-guide/
Paul, J. (n.d.). How to close telnet terminal in Linux and windows (quit, exit Not working)?
Example. Javarevisited.
https://javarevisited.blogspot.com/2016/06/how-to-close-telnet-terminal-in-linux-windows-q
uite-exit-not-working.html#axzz728JbwsTq.
Working with active and passive exploits in Metasploit. (n.d.). Retrieved from
https://www.offensive-security.com/metasploit-unleashed/exploits/
https://www.youtube.com/watch?v=IU_jCaMjvaI