Olympus cannot exploit

Does anyone has the problem of getting the shell of the machine by xdebug? I have tried the method of Ippsec of the xdebug chrome app. But the app has not intercept the request.
And I also have tried unix/http/xdebug_unauth_exec payload of msf. But the result is always “Exploit completed, but no session was created.”
I also have tried the payload exp.py of vulnhub. But it always indicates timeout to bind port 9000 to 0.0.0.0.
Does anyone come cross the same issue and know the reason. Thank you in advance.

You can try the method I used in my write-up.

Type your comment> @epi said:

You can try the method I used in my write-up.

HTB{ Olympus }

Hey, thanks for your reply. I will try later. I have noticed that you have written the walkthrough of TartarSource. I have a problem in this box because of wpscan. The 3.5.2 wpscan has to specific --wp-content-dir, but when I try to scan with wpscan --url http://10.10.10.88/webservices/wp -e ap --wp-content-dir wp-content. The result shows no plugins. The truth is in the opposite.

I know the version you used is 2.9.4. Is it a only solution to change the version from 3.5.2 to 2.9.4. Or something wrong with my command?

It will be appreciated if you know the cause. Thanks in advance.

tst

tst