"This exploit requires manual clean up of “image.php” on the target.
You know what I am talking about.
Any hints how to fix?
"This exploit requires manual clean up of “image.php” on the target.
You know what I am talking about.
Any hints how to fix?
Spoiler Removed
I think people suggested using other non-meterpreter payloads? I am still stuck on privesc and getting a consistent shell myself, but IIRC that’s what people suggested in other threads.
I tried reseting the machine but it still gives me the same error. I’m going to try what alrightx3 said and maybe it will work.
EDIT: Still the same problem after reseting. Tried non-meterpreter payloads and it didn’t work. May someone PM me a solution?
When I had that error I simply CTRL C’d and did the sessions -i and I had my meterpreter session there
@Elephant7oast I had the same issue. Make sure it tries to connect to you. And also you need good ears pointing in the right direction
@xplo8 said:
When I had that error I simply CTRL C’d and did the sessions -i and I had my meterpreter session there
hey their,
what you did after you got a meterpreter session?