1N3 / Sn1per

Attack Surface Management Platform
https://sn1persecurity.com
Other
8.06k stars 1.85k forks source link

No payload configured question. #292

Closed JaseNZC closed 4 years ago

JaseNZC commented 4 years ago

On a new install on Kali linux 20.3 Metasploit does not seem to have a default.

Is there something I should be setting as a default in Metasploit ??

When detecting , ssh or ftp and it running an exploit you get the following

RHOST => . RHOSTS => . LHOST => 127.0.0.1 LPORT => 4444 [] Exploiting target ... [-] 82.208.12.55:21 - Exploit failed: A payload has not been selected. [] Exploiting target 2001:1528:246:0:ff52:d00c:37ff:0 [-] 2001:1528:246:0:ff52:d00c:37ff:0:21 - Exploit failed: A payload has not been selected. [*] Exploit completed, but no session was created.

1N3 commented 4 years ago

Will look into this..

1N3 commented 4 years ago

Looks like this the default behavior in the latest MSF and no other valid payloads exist, but it shouldn't affect the results of the scan since it defaults to interactive shell.

msf6 > use exploit/unix/ftp/vsftpd_234_backdoor
[*] No payload configured, defaulting to cmd/unix/interact
msf6 exploit(unix/ftp/vsftpd_234_backdoor) > show payloads

Compatible Payloads
===================

   #  Name               Disclosure Date  Rank    Check  Description
   -  ----               ---------------  ----    -----  -----------
   0  cmd/unix/interact                   normal  No     Unix Command, Interact with Established Connection

msf6 exploit(unix/ftp/vsftpd_234_backdoor) >