This video is a walkthrough on how to exploit open ports on a target system using a host system. The host system is Kali Linux and the target system is Metasploitable.
I've been trying to figure out your issue....but try entering the "lhost" with the host IP address before running the running the injection and see if the error is fixed. Depending on your situation, you may need to even set a payload. Good luck!
Maybe metasploit isn't up to date. What Linux distribution do you use and how did you install metasploit? If you are on Debian or Ubuntu, msfupdate should work
if you keep everything updated this won't work, what he is doing in the video rarely works in any real life scenario and relies on exploits that are several years old
It's kinda amazing that msf is still actively updating its payload database, rather than phased out as an archived project.
This is the real thing i was looking for. Great tutorial
Very good tutorial. Excellent presentation. Can't wait to see future tutorials.
This was not just "an http port 80".
but great tutorial, keep it going❤
needed this example. class lecture just skimmed over the vulnerability. Thanks man
Great job man, Thanks for the lesson
Nice video man. Keep up the work.
Fantastic! You are a genius! Thank you for your video!
saved my life with this video thanks boss!!!!!
Informative video upload more videos like this ❤
Great job brother ❤
Thanks for sharing!!
I appreciate you. Thank you.
Great 👍 👌 ....more stuff
Great job
Good content
Not many employees can do that at their work
very nice
good job
Pro tip don’t copy and paste the payload you could ran “use 0” which is nice when browsing multiple options on your aux search
Nice !
nice bro
you saved my fucking life broski.
We want more. xD
No payload configured, defaulting to php/meterpreter/reverse_tcp
I get this when I try to select the php_cgi arg injection, any help?
I've been trying to figure out your issue....but try entering the "lhost" with the host IP address before running the running the injection and see if the error is fixed. Depending on your situation, you may need to even set a payload. Good luck!
said the same thing for me but i typed "use 0" and it worked
Which version of Kali Linux are you using?
Looks like gnome desktop interface and the basic version of Kali but all including the live and vm version all are the same
You can type 'use {index}' for using the exploit
i tried that but i kept getting a failed to loas module kind of message. would you know why
Maybe metasploit isn't up to date. What Linux distribution do you use and how did you install metasploit? If you are on Debian or Ubuntu, msfupdate should work
Wicked
mine is msf6 and cant got error
What kind of kali is this please
if you are refering to the desktop environment it looks like Gnome
Bruh make few vedios on SMTP ftp ssh vnc smb and at last MySQL and postgres
Thanks, I needed some new ideas for videos.
upload more vdos bro
Working on it!
how th is this video not down
What is the purpose of this for ???
Promote world peace
2 mount ago 💀
more
Hi please hack ip that you never know before
No clue whats going on here. How can i make sure im bot being exploited by this ?
if you keep everything updated this won't work, what he is doing in the video rarely works in any real life scenario and relies on exploits that are several years old
@@swag2315 good news i hope
Bro php is < 8 version and your ubuntu is 5.10 haha veryyyyyyyyyyy old exploit
script kiddie