Closed DritzPS closed 3 years ago
msf6 > use exploit/windows/http/rejetto_hfs_exec
[*] Using configured payload windows/meterpreter/reverse_tcp
msf6 exploit(windows/http/rejetto_hfs_exec) > version
Framework: 6.1.5-dev-3c82f43644
Console : 6.1.5-dev-3c82f43644
msf6 > use exploit/windows/http/rejetto_hfs_exec
[*] No payload configured, defaulting to windows/meterpreter/reverse_tcp
msf6 exploit(windows/http/rejetto_hfs_exec) > version
Framework: 6.1.7-dev-b7fd61c92a
Console : 6.1.7-dev-b7fd61c92a
Steps to reproduce
How'd you do it?
This section should also tell us any relevant information about the environment; for example, if an exploit that used to work is failing, tell us the victim operating system and service versions.
Info on machine can be found on: https://tryhackme.com/room/steelmountain
Were you following a specific guide/tutorial or reading documentation?
https://tryhackme.com/room/steelmountain (gaining initial access)
Expected behavior
Use metasploit to gain shell access (meterpreter)
Current behavior
Doesn't load the correct payload and the module is not set anymore (after current update as of today, was working yesterday)
Metasploit version
6.1.6-dev-
Additional Information
If your version is less than
5.0.96
, please update to the latest version and ensure your issue is still present.If the issue is encountered within
msfconsole
, please run thedebug
command using the instructions below. If the issue is encountered outisdemsfconsole
, or the issue causesmsfconsole
to crash on startup, please delete this section.msfconsole
set loglevel 3
debug
command===8<=== CUT AND PASTE EVERYTHING BELOW THIS LINE ===8<===
line and make sure to REMOVE ANY SENSITIVE INFORMATION.