🔬Tomcat - MSF Exploit
Lab 1
Target IP:
10.2.24.113Exploit the target with the appropriate Metasploit Framework module
service postgresql start && msfconsole -qdb_status
setg RHOSTS 10.2.24.113
setg RHOST 10.2.24.113
workspace -a TOMCATPerform an
nmapscan directly into MSF
db_nmap -sS -sV -O 10.2.24.113
Try tomcat from a browser
http://10.2.24.113:8080/
Or use a specific payload
A CMD shell session is provided
Obtain a
Meterpretersession
Generate a Windows
meterpreterpayload. Open a new terminal tab
In the first
msfconsoletab
Terminate the python web server and set up the handler in the second tab
Execute the
meterpreter.exeon the target system
Reverse
Meterpretersession will be opened.
Last updated
Was this helpful?
