In This blog post we will be looking at how Metasploitable 2 virtual machine can be exploited. We will be using Metasploit and other tools to the hacking.
ssh_keygen
Details: Unlike earlier exploits where metasploit was used, in this it is not used. We are exploiting
using generating keys
unreal_irhd_3281_backdoor
Details: we use a backdoor to exploit the Linux system. We only need to give the RHOST IP before exploiting.
distcc_exec
Details: Only the RHOST IP needs to be given by us.