Does anyone has the problem of getting the shell of the machine by xdebug? I have tried the method of Ippsec of the xdebug chrome app. But the app has not intercept the request.
And I also have tried unix/http/xdebug_unauth_exec payload of msf. But the result is always "Exploit completed, but no session was created."
I also have tried the payload exp.py of vulnhub. But it always indicates timeout to bind port 9000 to 0.0.0.0.
Does anyone come cross the same issue and know the reason. Thank you in advance.