loding BSidesLjubljana0x7E2

| December 1st, 2017
msf > banner

MMMMMMMMMMMMMMMMNmddmNMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
MMN..-..--+MMNy:...-.-/yNMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
MMy..ymd-.:Mm::-:osyo-..-mMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
MM:..---.:dM/..+NNyyMN/..:MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
Mm../dds.-oy.-.dMh--mMds++MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
My:::::/ydMmo..-hMMMmo//omMs/+Mm+++++shNMN+//+//+oMNy+///ohM
MMMs//yMNo+hMh---m:-:hy+sMN..+Mo..os+.-:Ny--ossssdN-.:yyo+mM
MMMo..oMNo/hMo..-m:..-:+hMy--dN-./MMMo.-d/..::::sMN:..-:+hMM
MMMN:../yddy:...hyymdh:..m:--Mh--yNms--om--+ddddNMmymdy:..mM
MMMMMy/....---omd:-.--.:hd..oM/....-:+dMs--::--.ym:..--.:yMM
MMMMMMMMmdddNMMMMMMmmmNMMNmmNMNmmmmMMMMMNmmmmmNmMMMNmdmNMMMM

       =[ metasploit v4.14.1-dev [core:4.14.1.pre.dev api:1.0.0]]
+ -- --=[ 1372 exploits - 766 auxiliary - 221 post        ]
+ -- --=[ 340 payloads - 37 encoders - 8 nops             ]
+ -- --=[ Free Metasploit Pro 			          ]

msf > set RHOST 0x7e2.bsidesljubljana.si
RHOST => 0x7e2.bsidesljubljana.si
msf > set RPORT 443
RPORT => 44
3runmsf > use exploit/bsides/bsides_module
msf exploit(bsides_module) > info

       Name: Security BSides Module
     Module: exploit/bsides/bsides_module
    Version: 0x7E2
   Platform: FruBSD
 Privileged: No
    License: Metasploit Framework License (BSD)
       Rank: Excellent

Provided by:
  lowk3y 

Available targets:
  Id  Name
  --  ----
  0   Automatic Targeting

Basic options:
  Name  Current Setting  Required  Description
  ----  ---------------  --------  -----------
  RHOST  ***********      yes       The target address
  RPORT  445              yes       Set the CTP service port
  DATA   LOAD-CFP    	  yes       The output data

Payload information:

Description:
  If this module loads, you know you're doing it right.

References:
  http://bsidesljubljana.si

msf exploit(bsides_module) > check
[*] Verifying vulnerable status... (path: 0x0000005a)
[*] System is not vulnerable (status: 0x00000000)
[*] The target is exploitable.

msf exploit(bsides_module) > exploit

[*] Starting bind handler
[*] Automatically detecting the target
[*] Extracting data

<<<<<< dadad09a2-dda||ddMMDSA1@-kkk@@!(#[da[[fsfa9f4]]])dapdfm..mcbvc MMMMMMMMMMMMMMMMNmddmNMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM MMN..-..--+MMNy:...-.-/yNMMMMMMMMM10/03/2018MMMLJUBLJANAMMMM
MMy..ymd-.:Mm::-:osyo-..-mMMMMMMMMMMMMPOLIGONMMMMMMMMMMMMMMM
MM:..—.:dM/..+NNyyMN/..:MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
Mm../dds.-oy.-.dMh–mMds++MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
My:::::/ydMmo..-hMMMmo//omMs/+Mm+++++shNMN+//+//+oMNy+///ohM
MMMs//yMNo+hMh—m:-:hy+sMN..+Mo..os+.-:Ny–ossssdN-.:yyo+mM
MMMo..oMNo/hMo..-m:..-:+hMy–dN-./MMMo.-d/..::::sMN:..-:+hMM
MMMN:../yddy:…hyymdh:..m:–Mh–yNms–om–+ddddNMmymdy:..mM
MMMMMy/….—omd:-.–.:hd..oM/….-:+dMs–::–.ym:..–.:yMM
MMMMMMMMmdddNMMMMMMmmmNMMNmmNMNmmmmMMMMMNmmmmmNmMMMNmdmNMMMM
MMMMC/F/P/|OPEN.>><>./cfp>>>>>>>>>>>
dasdad0d00ffdff
…..

kernel: msfconsole[15514]: segfault at 794ef0 ip 080513b sp 794ef0 error 6 in msfconsole[8048000+24000]

Comments are closed.