ParrotOS for Reverse shells

@A1a3h said:

i was solving cache machine and downloaded the xploit from xploit-db . i tried in my kali more than 5 times it was showing python errors

It would be interesting to know what exploit you used here - its a retired box so it isn’t really a spoiler.

I am with @gunroot in that they should be the same here, its difficult to think why the exploit would work on one, not the other.

Checking my notes, I didn’t use any ExploitDB code for Cache.

From what I can see, there is one place where you could use OpenEMR 5.0.1.3 - Remote Code Execution (Authenticated) - PHP webapps Exploit but I found it easier to simply upload a pentest monkey webshell to the bottom of config.php and browse to that.