Slide 53
Slide 53 text
msfrpcd
$ msfrpcd -U hdm -P s3cr3tp4ss
[*] XMLRPC starting on 0.0.0.0:55553 (SSL)...
[*] XMLRPC initializing...
[*] XMLRPC backgrounding...
$ msfrpc -U hdm -P s3cr3tp4ss -a 127.0.0.1
[*] The 'rpc' object holds the RPC client interface
>> rpc.call("module.info", "exploit", "solaris/telnet/ttyprompt")
=> {"name"=>"Solaris in.telnetd TTYPROMPT Buffer Overflow",
"license"=>"Metasploit Framework License (BSD)",
"targets"=>{"0"=>"Automatic"}, "version"=>"6854", "default_target"=>0,
"filepath"=>"/msf3/modules/exploits/solaris/telnet/ttyprompt.rb",
"description"=>"\n\t\t\t\tThis module uses a buffer overflow in the
Solaris 'login'\n\t\t\tapplication to bypass authentication in the
telnet daemon. \n\t\t\t", "authors"=>["MC ", "cazz
"], "references"=>[["BID", "5531"], ["CVE", "2001-0797"],
["MIL", "66"]]}