I have identified the app running on the target so the first question is done but then I can see two different exploits in MFS and both of them do check before attempting to exploit and both of them return that the target is not vulnerable. I saw some walkthrough regarding that but they did exactly the same thing as I did and their seems to be vulnerable while mine is not. Not sure what’s wrong tbh. I have used the linux exploit, set LHOST and RHOST but it ends up being not vulnerable. I would appreciate any pointers regarding that. Thank you!
Do you have a bit more info on which Module and which Section you are talking about?