![]() Msf5 exploit(unix/webapp/wp_reflexgallery_file_upload) > use post/multi/recon/local_exploit_suggester Failed to start exploit/multi/handler on 4433, it may be in use by another process. SESSION may not be compatible with this module. Executing 'post/multi/manage/shell_to_meterpreter' on session(s): Msf5 exploit(unix/webapp/wp_reflexgallery_file_upload) > sessions -u 1 ![]() Msf5 exploit(unix/webapp/wp_reflexgallery_file_upload) > run Kali Linux 2019.4 virtual machine in VirtualboxĬonsole : 5.0.64-dev I installed Metasploit with: Runs for a few seconds and then throw an error 10.0.2.16 - Collecting local exploits for x86/linux. ![]() Runs for a few seconds and then throw an error: It should run showing possible ways to elevate privileges if there are. ![]() I tried to run the module also within the meterpreter session using run post/multi/recon/local_exploit_suggester and still giving out the error. 10.0.2.16 - /usr/share/metasploit-framework/modules/post/multi/recon/local_exploit_suggester.rb:119:in `run' 10.0.2.16 - /usr/share/metasploit-framework/modules/post/multi/recon/local_exploit_suggester.rb:119:in `each' 10.0.2.16 - /usr/share/metasploit-framework/modules/post/multi/recon/local_exploit_suggester.rb:121:in `block in run' 10.0.2.16 - /usr/share/metasploit-framework/modules/exploits/linux/local/apport_abrt_chroot_priv_esc.rb:87:in `check' 10.0.2.16 - Post failed: ArgumentError Malformed version number string sh: 0: getcwd() failed: No such file or directory 10.0.2.16 - 32 exploit checks are being tried. It's worth noting that a quick review of the Setuid Nmap Exploit module shows the exploit should work with either shell or meterpreter sessions - it's only the check method which is problematic.10.0.2.16 - Collecting local exploits for x86/linux. 172.16.191.252 - /pentest/exploit/metasploit-framework/modules/post/multi/recon/local_exploit_suggester.rb:134:in `run' 172.16.191.252 - /pentest/exploit/metasploit-framework/modules/post/multi/recon/local_exploit_suggester.rb:134:in `each' 172.16.191.252 - /pentest/exploit/metasploit-framework/modules/post/multi/recon/local_exploit_suggester.rb:136:in `block in run' 172.16.191.252 - /pentest/exploit/metasploit-framework/modules/exploits/unix/local/setuid_nmap.rb:54:in `check' 172.16.191.252 - Post failed: NoMethodError undefined method `fs' for # 172.16.191.252 - Collecting local exploits for cmd/unix. Msf post(multi/recon/local_exploit_suggester) > run Msf post(multi/recon/local_exploit_suggester) > set session 1 Msf exploit(multi/handler) > use post/multi/recon/local_exploit_suggester
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |