When I am trying to use xoda exploit on the target machine as part of the ctf, the following error is showing up:
exploit(unix/webapp/xoda_file_upload)
[] Started reverse TCP handler on 10.2.8.23:4444
[] Sending PHP payload (wPRDKmiDmRJ.php)
[] Executing PHP payload (wPRDKmiDmRJ.php)
[] Exploit completed, but no session was created.
Looking at google, I have already tried disabling Defender Firewall and Threat Protection. However, the error persists. Is someone facing the same issue, if so, how did you overcome this?