rapid7 / metasploit-framework

Metasploit Framework
https://www.metasploit.com/
Other
34.14k stars 13.97k forks source link

exploit/windows/http/rejetto_hfs_exec #15678

Closed DritzPS closed 3 years ago

DritzPS commented 3 years ago

Steps to reproduce

How'd you do it?

  1. Loaded exploit/windows/http/rejetto_hfs_exec
  2. no module found (after recent update)
  3. Incorrect payload set

This section should also tell us any relevant information about the environment; for example, if an exploit that used to work is failing, tell us the victim operating system and service versions.

Info on machine can be found on: https://tryhackme.com/room/steelmountain

Were you following a specific guide/tutorial or reading documentation?

https://tryhackme.com/room/steelmountain (gaining initial access)

Expected behavior

Use metasploit to gain shell access (meterpreter)

Current behavior

Doesn't load the correct payload and the module is not set anymore (after current update as of today, was working yesterday)

Metasploit version

6.1.6-dev-

Additional Information

If your version is less than 5.0.96, please update to the latest version and ensure your issue is still present.

If the issue is encountered within msfconsole, please run the debug command using the instructions below. If the issue is encountered outisde msfconsole, or the issue causes msfconsole to crash on startup, please delete this section.

  1. Start msfconsole
  2. Run the command set loglevel 3
  3. Take the steps necessary recreate your issue
  4. Run the debug command
  5. Copy all the output below the ===8<=== CUT AND PASTE EVERYTHING BELOW THIS LINE ===8<=== line and make sure to REMOVE ANY SENSITIVE INFORMATION.
  6. Replace these instructions and the paragraph above with the output from step 5.
h00die commented 3 years ago
msf6 > use exploit/windows/http/rejetto_hfs_exec 
[*] Using configured payload windows/meterpreter/reverse_tcp
msf6 exploit(windows/http/rejetto_hfs_exec) > version
Framework: 6.1.5-dev-3c82f43644
Console  : 6.1.5-dev-3c82f43644
h00die commented 3 years ago
msf6 > use exploit/windows/http/rejetto_hfs_exec
[*] No payload configured, defaulting to windows/meterpreter/reverse_tcp
msf6 exploit(windows/http/rejetto_hfs_exec) > version
Framework: 6.1.7-dev-b7fd61c92a
Console  : 6.1.7-dev-b7fd61c92a