Gray Area
Origin: United States
Starting nmap V. 254BETA25
Nmap run completed – TARGET IP address scanned and vulnerable
Port : 22, Type: TCP, Owner: INSOMNIAC
Sshnuke 10.2.2.2
Connecting to 10.2.2.2 … successful
Attempting to exploit SSHv1 CRC32 … successful
Resetting root password to “D4RKM0D3”… successful
System open: Access Level <9>
Downloading/unpacking GrayArea.tar.gz… successful
Sending exploit …
Exploit completed …
FULL ACCESS GRANTED ///
LOADING SIMULATION: GRAY AREA