Attack 03 — Exploitation

The Metasploit Framework Exploit

Overview

The Metasploit Framework was used to launch a reverse shell attack against an Ubuntu server. Additional reconnaissance was performed to obtain critical information needed for the exploit. A reverse shell attack allows the attacker to send remote commands to the target system.

Reconnaissance

Step 1 — OS fingerprinting

The nmap -O flag was used to fingerprint the OS at 192.168.10.10. The host was identified as running Linux version 4.X or 5.X.

nmap OS detection output

Step 2 — Service version detection

The nmap -sV flag discovered VSFTPD version 2.3.4 running on the server — a version with a known exploitable backdoor.

nmap service version scan showing VSFTPD 2.3.4

Demonstration

Step 3 — Find the exploit

Searching for VSFTPD in Metasploit revealed a backdoor exploitable in version 2.3.4 — the exact version found on the target.

Metasploit search showing VSFTPD exploit

Step 4 — Configure the exploit

The use 0 command selected the exploit. The RHOST option was set to 192.168.10.10.

Metasploit RHOST configuration

Step 5 — Execute

The run command launched the exploit. Metasploit connected to FTP, triggered the backdoor, and successfully opened a reverse shell session on the Ubuntu server.

Metasploit run output showing session opened

Step 6 — Confirm shell access

Running uname -a returned Linux 4.15.0, confirming remote access. Commands like ls and whoami further verified full shell access.

Remote shell commands confirming access

Video demonstration