Let’s try a different exploit on an Ubuntu 9.04 virtual machine. The steps are pretty much the same as for the preceding exploit except that we will select a different payload.
nmap -sT -A -P0 192.168.33.132[*] exec: nmap -sT -A -P0 192.168.33.132 Starting Nmap 5.20 ( http://nmap.org ) at 2011-03-15 19:35 EDT Warning: Traceroute does not support idle or connect scan, disabling... Nmap scan report for 192.168.33.132 Host is up (0.00048s latency). Not shown: 997 closed ports PORT STATE SERVICE VERSION
80/tcp openhttp Apache httpd 2.2.3 ((
Ubuntu) PHP/5.2.1) |_html-title: Index of /