loding BSidesLjubljana0x7E2
| December 1st, 2017msf > banner MMMMMMMMMMMMMMMMNmddmNMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM MMN..-..--+MMNy:...-.-/yNMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM MMy..ymd-.:Mm::-:osyo-..-mMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM MM:..---.:dM/..+NNyyMN/..:MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM Mm../dds.-oy.-.dMh--mMds++MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM My:::::/ydMmo..-hMMMmo//omMs/+Mm+++++shNMN+//+//+oMNy+///ohM MMMs//yMNo+hMh---m:-:hy+sMN..+Mo..os+.-:Ny--ossssdN-.:yyo+mM MMMo..oMNo/hMo..-m:..-:+hMy--dN-./MMMo.-d/..::::sMN:..-:+hMM MMMN:../yddy:...hyymdh:..m:--Mh--yNms--om--+ddddNMmymdy:..mM MMMMMy/....---omd:-.--.:hd..oM/....-:+dMs--::--.ym:..--.:yMM MMMMMMMMmdddNMMMMMMmmmNMMNmmNMNmmmmMMMMMNmmmmmNmMMMNmdmNMMMM =[ metasploit v4.14.1-dev [core:4.14.1.pre.dev api:1.0.0]] + -- --=[ 1372 exploits - 766 auxiliary - 221 post ] + -- --=[ 340 payloads - 37 encoders - 8 nops ] + -- --=[ Free Metasploit Pro ] msf > set RHOST 0x7e2.bsidesljubljana.si RHOST => 0x7e2.bsidesljubljana.si msf > set RPORT 443 RPORT => 44 3runmsf > use exploit/bsides/bsides_module msf exploit(bsides_module) > info Name: Security BSides Module Module: exploit/bsides/bsides_module Version: 0x7E2 Platform: FruBSD Privileged: No License: Metasploit Framework License (BSD) Rank: Excellent Provided by: lowk3yAvailable targets: Id Name -- ---- 0 Automatic Targeting Basic options: Name Current Setting Required Description ---- --------------- -------- ----------- RHOST *********** yes The target address RPORT 445 yes Set the CTP service port DATA LOAD-CFP yes The output data Payload information: Description: If this module loads, you know you're doing it right. References: http://bsidesljubljana.si msf exploit(bsides_module) > check [*] Verifying vulnerable status... (path: 0x0000005a) [*] System is not vulnerable (status: 0x00000000) [*] The target is exploitable. msf exploit(bsides_module) > exploit [*] Starting bind handler [*] Automatically detecting the target [*] Extracting data
<<<<<<
dadad09a2-dda||ddMMDSA1@-kkk@@!(#[da[[fsfa9f4]]])dapdfm..mcbvc
MMMMMMMMMMMMMMMMNmddmNMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
MMN..-..--+MMNy:...-.-/yNMMMMMMMMM10/03/2018MMMLJUBLJANAMMMM
MMy..ymd-.:Mm::-:osyo-..-mMMMMMMMMMMMMPOLIGONMMMMMMMMMMMMMMM
MM:..—.:dM/..+NNyyMN/..:MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
Mm../dds.-oy.-.dMh–mMds++MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
My:::::/ydMmo..-hMMMmo//omMs/+Mm+++++shNMN+//+//+oMNy+///ohM
MMMs//yMNo+hMh—m:-:hy+sMN..+Mo..os+.-:Ny–ossssdN-.:yyo+mM
MMMo..oMNo/hMo..-m:..-:+hMy–dN-./MMMo.-d/..::::sMN:..-:+hMM
MMMN:../yddy:…hyymdh:..m:–Mh–yNms–om–+ddddNMmymdy:..mM
MMMMMy/….—omd:-.–.:hd..oM/….-:+dMs–::–.ym:..–.:yMM
MMMMMMMMmdddNMMMMMMmmmNMMNmmNMNmmmmMMMMMNmmmmmNmMMMNmdmNMMMM
MMMMC/F/P/|OPEN.>><>./cfp>>>>>>>>>>>
dasdad0d00ffdff
…..
kernel: msfconsole[15514]: segfault at 794ef0 ip 080513b sp 794ef0 error 6 in msfconsole[8048000+24000]