Hacking into Virtual Machine – 3. FTP Hacking
So let’s use our first vulnerability and use it to exploit the machine. We are going to start with the first and so the TCP report number 21 and the service behind it …
source by X Sploit
linux ftp server