I've been trying to figure out your issue....but try entering the "lhost" with the host IP address before running the running the injection and see if the error is fixed. Depending on your situation, you may need to even set a payload. Good luck!
@@CreativityRealizedIt's a payload error. Using this on an external IP address requires port forwarding in order to launch the reverse shell. Your example was an internal IP on your network
Maybe metasploit isn't up to date. What Linux distribution do you use and how did you install metasploit? If you are on Debian or Ubuntu, msfupdate should work
Base64 is not and i guess never ever was the standard encryption mode or method to mask a shadow file with Hashes, seems like you've added purposely those strings coded using Base64 for an easy job! No problem for educational purpose, but if you wanna simulate a more realistic environment that's not the right way!
if you keep everything updated this won't work, what he is doing in the video rarely works in any real life scenario and relies on exploits that are several years old
Brother in Christ as salty as this may make you msf is a tool like any other and it's not as straight forward as you think script kiddies are much worse when it comes to ripping code and don't tend to have a understanding or grasp what there doing this is low level yes
My name terorisme hacker cyber Indonesian virus Trojan server nginux and spam internet Department Pertahananan Republik Indonesian system digerd Inc Indonesian
It's kinda amazing that msf is still actively updating its payload database, rather than phased out as an archived project.
This is the real thing i was looking for. Great tutorial
This was not just "an http port 80".
but great tutorial, keep it going❤
needed this example. class lecture just skimmed over the vulnerability. Thanks man
Very good tutorial. Excellent presentation. Can't wait to see future tutorials.
Great video. I was a little triggered when you copied and pasted the exploit instead of “use 0” haha
Great job man, Thanks for the lesson
saved my life with this video thanks boss!!!!!
Nice video man. Keep up the work.
Great job brother ❤
After scanning, you need to brute force the posts that most likely contain passwords from that site.
Pro tip don’t copy and paste the payload you could ran “use 0” which is nice when browsing multiple options on your aux search
word
Fantastic! You are a genius! Thank you for your video!
Not many employees can do that at their work
Informative video upload more videos like this ❤
what if php doesnt pop up after running metaploit??
Thanks for sharing!!
Great 👍 👌 ....more stuff
No payload configured, defaulting to php/meterpreter/reverse_tcp
I get this when I try to select the php_cgi arg injection, any help?
I've been trying to figure out your issue....but try entering the "lhost" with the host IP address before running the running the injection and see if the error is fixed. Depending on your situation, you may need to even set a payload. Good luck!
said the same thing for me but i typed "use 0" and it worked
@@CreativityRealizedIt's a payload error. Using this on an external IP address requires port forwarding in order to launch the reverse shell. Your example was an internal IP on your network
Nice tutorial but i have a question if you can see this
If i use an actual running website ip address that has 80 opened would it work?🤔
Probably
I appreciate you. Thank you.
UMGC pentest class?
Good content
Which version of Kali Linux are you using?
Looks like gnome desktop interface and the basic version of Kali but all including the live and vm version all are the same
Awesome 😊
Great job
What kind of kali is this please
if you are refering to the desktop environment it looks like Gnome
bagaimana jika terhalang firewall unutk phpinfo?
You can type 'use {index}' for using the exploit
i tried that but i kept getting a failed to loas module kind of message. would you know why
Maybe metasploit isn't up to date. What Linux distribution do you use and how did you install metasploit? If you are on Debian or Ubuntu, msfupdate should work
hello can you help me about hack and about Kali linux please ?
mine is msf6 and cant got error
Good one
good job
Hey bro I'm having some trouble with and assignment is there anyway you could reach out to me and give me some help please
very nice
Bruh make few vedios on SMTP ftp ssh vnc smb and at last MySQL and postgres
Thanks, I needed some new ideas for videos.
Nice !
nice bro
We want more. xD
you saved my fucking life broski.
how th is this video not down
upload more vdos bro
Working on it!
Wicked
Gold
Base64 is not and i guess never ever was the standard encryption mode or method to mask a shadow file with Hashes, seems like you've added purposely those strings coded using Base64 for an easy job! No problem for educational purpose, but if you wanna simulate a more realistic environment that's not the right way!
You could have just typed use 0 u didn't have to copy and paste
What is the purpose of this for ???
Promote world peace
its for a class.
No clue whats going on here. How can i make sure im bot being exploited by this ?
if you keep everything updated this won't work, what he is doing in the video rarely works in any real life scenario and relies on exploits that are several years old
@@swag2315 good news i hope
Bro php is < 8 version and your ubuntu is 5.10 haha veryyyyyyyyyyy old exploit
more
script kiddie
where can i learn real shit
Brother in Christ as salty as this may make you msf is a tool like any other and it's not as straight forward as you think script kiddies are much worse when it comes to ripping code and don't tend to have a understanding or grasp what there doing this is low level yes
But it can always be worse
Hi please hack ip that you never know before
2 mount ago 💀
My name terorisme hacker cyber Indonesian virus Trojan server nginux and spam internet Department Pertahananan Republik Indonesian system digerd Inc Indonesian