Closed Mosasi closed 6 months ago
The remote port of the remote host was not reachable.
Set rport
and rhost
to the correct port and host respectively.
The remote port of the remote host was not reachable.
Set
rport
andrhost
to the correct port and host respectively.
msf6 exploit(unix/ftp/vsftpd_234_backdoor) > run
[-] ...:21 - Exploit failed [unreachable]: Rex::ConnectionRefused The connection was refused by the remote host (...:21). [*] Exploit completed, but no session was created. msf6 exploit(unix/ftp/vsftpd_234_backdoor) >
The remote port on the remote host was not reachable.
Set rport
and rhost
to the correct port and host respectively.
"msf6 > use exploit/unix/ftp/vsftpd_234_backdoor [*] No payload configured, defaulting to cmd/unix/interact"
The problem exists before I start working on rhost rport
I have set the correct RHOST.
Metasploit Documentation: https://docs.metasploit.com/
[] No payload configured, defaulting to cmd/unix/interact RHOST => ...* [] Exploit running as background job 0. [] Exploit completed, but no session was created. msf6 exploit(unix/ftp/vsftpd_234backdoor) > [-] ...:21 - Exploit failed [unreachable]: Rex::HostUnreachable The host (..._:21) was unreachable.
I am facing a problem, what are the solutions in this case?
*And here I had set the correct RHOST.
"msf6 > use exploit/unix/ftp/vsftpd_234_backdoor [*] No payload configured, defaulting to cmd/unix/interact"
The problem exists before I start working on rhost rport
There is no problem here. You have not selected a payload so Metasploit chose one for you.
"msf6 > use exploit/unix/ftp/vsftpd_234_backdoor [*] No payload configured, defaulting to cmd/unix/interact" The problem exists before I start working on rhost rport
There is no problem here. You have not selected a payload so Metasploit chose one for you.
I know, but afterward, he repeats the same sentence to me ([-] ...:21 - Exploit failed [unreachable]: Rex::ConnectionRefused The connection was refused by the remote host (...:21). [*] Exploit completed, but no session was created. msf6 exploit(unix/ftp/vsftpd_234_backdoor) >)
Hi!
This issue has been left open with no activity for a while now.
We get a lot of issues, so we currently close issues after 60 days of inactivity. It’s been at least 30 days since the last update here. If we missed this issue or if you want to keep it open, please reply here. You can also add the label "not stale" to keep this issue open!
As a friendly reminder: the best way to see this issue, or any other, fixed is to open a Pull Request.
Hi again!
It’s been 60 days since anything happened on this issue, so we are going to close it. Please keep in mind that I’m only a robot, so if I’ve closed this issue in error please feel free to reopen this issue or create a new one if you need anything else.
As a friendly reminder: the best way to see this issue, or any other, fixed is to open a Pull Request.
Metasploit Documentation: https://docs.metasploit.com/
[] No payload configured, defaulting to cmd/unix/interact RHOST => ... [] Exploit running as background job 0. [] Exploit completed, but no session was created. msf6 exploit(unix/ftp/vsftpd_234_backdoor) > [-] ...:21 - Exploit failed [unreachable]: Rex::HostUnreachable The host (...*:21) was unreachable.
I am facing a problem, what are the solutions in this case?