INFORMAZIONI SU QUESTO ARTICOLO

Cita

Figure 1.

NMAP scan results
NMAP scan results

Figure 2.

Trying to log in
Trying to log in

Figure 3.

Start Metasploit
Start Metasploit

Figure 4.

Searching for the ssh_login module
Searching for the ssh_login module

Figure 5.

Loading the ssh_login module
Loading the ssh_login module

Figure 6.

Ssh_login module parameters
Ssh_login module parameters

Figure 7.

Set the parameters
Set the parameters

Figure 8.

Execution attack
Execution attack

Figure 9.

Successful login to the server
Successful login to the server

Figure 10.

Execution system command
Execution system command
eISSN:
2470-8038
Lingua:
Inglese
Frequenza di pubblicazione:
4 volte all'anno
Argomenti della rivista:
Computer Sciences, other