Metasploit Login With Ssh
The response given back from the command is "SSH-2.0-OpenSSH_6.7p1 Ubuntu-5ubuntu1". If I look at the physical Linux system I can find the version for SSH is "2.0" and also OpenSSH which is "6.7p1 Ubuntu-5ubuntu1". Running a port scan in Metasploit shows that Port 22 is open for SSH on the system 192.168.2.3.
metasploit-framework / modules / auxiliary / scanner / ssh / ssh_login.rb Find file Copy path h00die Land #12024 , add gatherproof to ssh_login modules 9274b1d Jul 10, 2019
The portfwd command from within the Meterpreter shell is most commonly used as a pivoting technique, allowing direct access to machines otherwise inaccessible from the attacking system. Running this command on a compromised host with access to both the attacker and destination network (or system), we can essentially forward TCP connections through this machine, effectively making it a pivot point.
Metasploit provide some SSH auxiliary modules who will permit you to scan the running version and do brute force login. You can find all these auxiliary modules through the Metasploit search command. SSH version scanner (ssh_version) To invoke this auxiliary module just type the following command :
ExaGrid - Known SSH Key and Default Password (Metasploit). CVE-2016-1561CVE-2016-1560 . remote exploit for Linux platform
SSH & Meterpreter Pivoting Techniques Configure Metasploit to use a SSH Pivot. The following is an example of how to configure Metersploit to use a SSH portward. In this example port 9999 is forwarded to the target and the attacking machine has an IP address of 192.168.2.100: