While enumerating we come across UnrealIRCd open on port 6667 on the machine
Searching for unrealIRCd in Metasploit, we come across an exploit available
Next we are going to check options
When attempting to run, we get an error stating the payload has not been selected
Looks like we have a few different options available. I went with the payload/cmd/unix/bind_perl (I was just going to go down the line until something hit
Boom! We have a shell!