Have a personal or library account? Click to login
Open Access
|Oct 2019

Figures & Tables

Figure 1.

NMAP scan results
NMAP scan results

Figure 2.

Trying to log in
Trying to log in

Figure 3.

Start Metasploit
Start Metasploit

Figure 4.

Searching for the ssh_login module
Searching for the ssh_login module

Figure 5.

Loading the ssh_login module
Loading the ssh_login module

Figure 6.

Ssh_login module parameters
Ssh_login module parameters

Figure 7.

Set the parameters
Set the parameters

Figure 8.

Execution attack
Execution attack

Figure 9.

Successful login to the server
Successful login to the server

Figure 10.

Execution system command
Execution system command
Language: English
Page range: 35 - 39
Published on: Oct 8, 2019
Published by: Xi’an Technological University
In partnership with: Paradigm Publishing Services
Publication frequency: 4 times per year

© 2019 Limei Ma, Dongmei Zhao, Yijun Gao, Chen Zhao, published by Xi’an Technological University
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.