rapid7/meterpreter

No payload configured, defaulting to php/meterpreter/reverse_tcp

override1057 opened this issue · 2 comments

Hi there.

I'm currently trying to use unix/webapp/wp_admin_shell_upload), however, when I type use unix/webapp/wp_admin_shell_upload) and hit intro, I'm getting the "Error" listed on the title above.

As you can see on the screenshots below, if I search for the exploit, I can see 1 valid result, but I can't use it.

Can you take a look please?

OS: Parrot
Metasploit: v6.0.2-dev
exploit: exploit/unix/webapp/wp_admin_shell_upload
Error
searchResult

Not an error. It's a status message. You selected a module. The module does not have a pre-configured payload. Metasploit selected a payload for you. You can choose a different payload with set payload <payload>.

Thanks @bcoles
I think I can go forward from here.
Please feel free to close this issue. Regards.