rapid7 / meterpreter

THIS REPO IS OBSOLETE. USE https://github.com/rapid7/metasploit-payloads INSTEAD
Other
328 stars 144 forks source link

No payload configured, defaulting to php/meterpreter/reverse_tcp #210

Closed override1057 closed 4 years ago

override1057 commented 4 years ago

Hi there.

I'm currently trying to use unix/webapp/wp_admin_shell_upload), however, when I type use unix/webapp/wp_admin_shell_upload) and hit intro, I'm getting the "Error" listed on the title above.

As you can see on the screenshots below, if I search for the exploit, I can see 1 valid result, but I can't use it.

Can you take a look please?

OS: Parrot Metasploit: v6.0.2-dev exploit: exploit/unix/webapp/wp_admin_shell_upload Error searchResult

bcoles commented 4 years ago

Not an error. It's a status message. You selected a module. The module does not have a pre-configured payload. Metasploit selected a payload for you. You can choose a different payload with set payload <payload>.

override1057 commented 4 years ago

Thanks @bcoles I think I can go forward from here. Please feel free to close this issue. Regards.