-
Notifications
You must be signed in to change notification settings - Fork 183
Description
:/$ ncat 192.168.136.142 22 -vvvp 61040
Ncat: Version 5.21 ( http://nmap.org/ncat )
NSOCK (0.0010s) TCP connection requested to 192.168.136.142:22 (IOD #1) EID 8
NSOCK (0.0010s) Callback: CONNECT SUCCESS for EID 8 [192.168.136.142:22]
Ncat: Connected to 192.168.136.142:22.
NSOCK (0.0010s) Read request from IOD #1 [192.168.136.142:22](timeout: -1ms) EID 18
NSOCK (0.0010s) Read request for 0 bytes from IOD #2 (peer unspecified) EID 26
changeme
NSOCK (11.8140s) Callback READ SUCCESS for EID 26 (peer unspecified) (9 bytes)
NSOCK (11.8140s) Write request for 9 bytes to IOD #1 EID 35 [192.168.136.142:22]
NSOCK (11.8140s) Callback: WRITE SUCCESS for EID 35 [192.168.136.142:22]
NSOCK (11.8140s) Read request for 0 bytes from IOD #2 (peer unspecified) EID 42
NSOCK (11.8140s) Callback: READ SUCCESS for EID 18 [192.168.136.142:22](25 bytes)
Welcome!
Here's a shell: NSOCK (11.8140s) Read request for 0 bytes from IOD #1 [192.168.136.142:22] EID 50
NSOCK (11.9590s) Callback: READ EOF for EID 50 [192.168.136.142:22]
Ncat: 9 bytes sent, 25 bytes received in 11.96 seconds.
NSOCK (11.9590s) Callback: READ KILL for EID 42 (peer unspecified)
No firewall on either side. Only pam worked for me