Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Metasploit exploits not successful with DISABLE_PROTECTION=1 #1

Open
suzannemaquelin opened this issue Sep 20, 2021 · 0 comments
Open

Comments

@suzannemaquelin
Copy link

What I did

Using the qcow2 image:

$ ./run_stage1.sh ./stage1_output
$ ./switch_to_wordpress.sh
$ ./run_stage2.sh stage1_output ./stage2_out_wordpress
$ DISABLE_PROTECTION=1 ./run_stage3.sh ./stage2_out_wordpress
$ docker run -d --name exploit --rm -v /home/paper/wordpress_exploits:/usr/share/exploits -it metasploitframework/metasploit-framework
$ docker exec -it exploit ./msfconsole -r /usr/share/exploits/foxy_exploit.rc

What I expected

The exploits should run successfully.

What happened

Metasploit notices no payload was configured and takes default; it starts a reverse TCP handler and sends PHP payload. Message: File wasn't uploaded, aborting! Exploit completed, but no session was created.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant