@Xim said:
@Ju577Ry said:
i’am stuck here guys . i need help .[] Started reverse TCP handler on (my IP):4444
[!] This exploit may require manual cleanup of ‘image.php’ on the target
[] Exploit completed, but no session was created.
msf exploit(nibbleblog_file_upload) >Hi @Ju577Ry,
I’m stuck there. Any hint how you fix the problem?
Thanks!
PM me , i will try to help u