Revising the approach
Let us summarize the entire penetration test step by step:
- In the very first step, we did an NMAP scan over the target.
- We found that VSFTPD 2.3.4 is running on port
21
and is vulnerable to attack. - We exploited VSFTPD 2.3.5 running on port
21
. - We got the shell access to the target running at
192.168.10.112
.
- We created a Linux meterpreter shell and copied it to the
/var/www
directory of Apache. Next, we ran thewget
command from the shell and downloaded our newly created meterpreter shell onto the target. - We assigned full privileges to the shell backdoor file via
chmod 777 backdoor.elf
. - Setting up an exploit handler in a separate window, which is listening on port
4444
, we ran thebackdoor.elf
file on the target. - We got the Linux meterpreter access on the target system, which is
192.168.10.112
.
- Running the
arp
command on the compromised system, we found that it was internally connected to a separate network and is connected to another system running on an internal IP address...