Closed JaseNZC closed 4 years ago
Will look into this..
Looks like this the default behavior in the latest MSF and no other valid payloads exist, but it shouldn't affect the results of the scan since it defaults to interactive shell.
msf6 > use exploit/unix/ftp/vsftpd_234_backdoor
[*] No payload configured, defaulting to cmd/unix/interact
msf6 exploit(unix/ftp/vsftpd_234_backdoor) > show payloads
Compatible Payloads
===================
# Name Disclosure Date Rank Check Description
- ---- --------------- ---- ----- -----------
0 cmd/unix/interact normal No Unix Command, Interact with Established Connection
msf6 exploit(unix/ftp/vsftpd_234_backdoor) >
On a new install on Kali linux 20.3 Metasploit does not seem to have a default.
Is there something I should be setting as a default in Metasploit ??
When detecting , ssh or ftp and it running an exploit you get the following
RHOST => . RHOSTS => . LHOST => 127.0.0.1 LPORT => 4444 [] Exploiting target ... [-] 82.208.12.55:21 - Exploit failed: A payload has not been selected. [] Exploiting target 2001:1528:246:0:ff52:d00c:37ff:0 [-] 2001:1528:246:0:ff52:d00c:37ff:0:21 - Exploit failed: A payload has not been selected. [*] Exploit completed, but no session was created.