runCtrl+C in order to exit from the sessionls or cat but not able to use things like shellI was doing a CTF (Mr Robot CTF on TryHackMe) and the target system was an Ubuntu machine. In this case the user I was using didn't have all the permissions.
I only used the info exploit/unix/webapp/wp_admin_shell_upload and understood how it works reading this.
It should call a well-made meterpreter session with all of the normal functionalities.
It gets stuck waiting for deletion of the xxxxxxxx.php file uploaded in order to exploit the system. I then solved the challenge doing my own plugin with a reverse shell, so I think that the problems is not about the target system but occurs because the script get stuck waiting and can't call a well-made meterpreter session.
Linux 5.7.0-kali1-amd64 x86_64 virtual machine on VirtualBox
4 CPU
8 GB RAM
50 GB of memory
Framework: 6.0.3-dev-
Console : 6.0.3-dev-
Kali package via apt
Linux 5.7.0-kali1-amd64 x86_64
Try to reinstall it once in the other directory
@GetRektBoy724 can you please stop with the Github spam unless you have something truly valuable to add, especially on old issues.
@GetRektBoy724 can you please stop with the Github spam unless you have something truly valuable to add, especially on old issues.
wtf im not spamming
Hi!
This issue has been left open with no activity for a while now.
We get a lot of issues, so we currently close issues after 60 days of inactivity. It鈥檚 been at least 30 days since the last update here.
If we missed this issue or if you want to keep it open, please reply here. You can also add the label "not stale" to keep this issue open!
As a friendly reminder: the best way to see this issue, or any other, fixed is to open a Pull Request.
Hi again!
It鈥檚 been 60 days since anything happened on this issue, so we are going to close it.
Please keep in mind that I鈥檓 only a robot, so if I鈥檝e closed this issue in error please feel free to reopen this issue or create a new one if you need anything else.
As a friendly reminder: the best way to see this issue, or any other, fixed is to open a Pull Request.
Most helpful comment
wtf im not spamming