Nibbles Reverse Shell Help

"This exploit requires manual clean up of “image.php” on the target.

You know what I am talking about.

Any hints how to fix?

Spoiler Removed

I think people suggested using other non-meterpreter payloads? I am still stuck on privesc and getting a consistent shell myself, but IIRC that’s what people suggested in other threads.

I tried reseting the machine but it still gives me the same error. I’m going to try what alrightx3 said and maybe it will work.

EDIT: Still the same problem after reseting. Tried non-meterpreter payloads and it didn’t work. May someone PM me a solution?

When I had that error I simply CTRL C’d and did the sessions -i and I had my meterpreter session there

@Elephant7oast I had the same issue. Make sure it tries to connect to you. And also you need good ears pointing in the right direction

@xplo8 said:
When I had that error I simply CTRL C’d and did the sessions -i and I had my meterpreter session there

hey their,
what you did after you got a meterpreter session?