Question: The vulnerability reports you generated in the lab identified several critical vulnerabilities. You used the vsftpd vulnerability to open a remote command shell, but there
The vulnerability reports you generated in the lab identified several critical vulnerabilities. You used the vsftpd vulnerability to open a remote command shell, but there is one other vulnerability in that report that could allow a hacker to open a remote command shell.
In your Challenge Questions file, identify the second vulnerability that could allow this access. First search Metasploit for the exploit associated with this vulnerability, and then use that exploit to open a remote shell. In the remote command shell, document your successful exploit. In your Challenge Questions file, document the recommended solution for the vulnerability.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
