Usando windows / smb / ms08_067_netapi exploit y windows / meterpreter / reverse_tcp como carga útil, esto es lo que obtengo:
msf payload(reverse_tcp) > generate -f ~/Desktop/rootkit.exe -p windows -t exe
[*] Writing 73802 bytes to ~/Desktop/rootkit.exe...
[-] Error while running command generate: No such file or directory @ rb_sysopen - ~/Desktop/rootkit.exe
Pila de llamadas:
/usr/share/metasploit-framework/lib/msf/ui/console/command_dispatcher/payload.rb:148:in 'initialize'
/usr/share/metasploit-framework/lib/msf/ui/console/command_dispatcher/payload.rb:148:in 'open'
/usr/share/metasploit-framework/lib/msf/ui/console/command_dispatcher/payload.rb:148:in 'cmd_generate'
/usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:430:in 'run_command'
/usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:392:in 'block in run_single'
/usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:386:in 'each'
/usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:386:in 'run_single'
/usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:205:in 'run'
/usr/share/metasploit-framework/lib/metasploit/framework/command/console.rb:48:in 'start'
/usr/share/metasploit-framework/lib/metasploit/framework/command/base.rb:82:in 'start'
/usr/bin/msfconsole:48:in '<main>'
No estoy seguro de cuál es el problema. Estoy corriendo Kali en una caja virtual. ¿Alguien tiene alguna idea?