Overview
This project demonstrates a security exploit using the vsftpd backdoor vulnerability, showcasing how it can be leveraged to gain unauthorized access to a target machine. The process involves scanning for open ports, loading Metasploit, and executing the exploit.
Steps Demonstrated
1. Scanning for Vulnerabilities
The first step involves using nmap to scan for open ports and verify vulnerabilities on port 21 (FTP). After confirming the open port, msfconsole is launched to prepare for the exploit.
2. Metasploit Module Execution
In this step, the exploit module for vsftpd is selected, and parameters are set to launch the attack. Successful exploitation grants access to the Metasploitable machine, enabling further analysis or control.