🔬Tomcat - MSF Exploit

Lab 1

🔬 Windows: Java Web Server

service postgresql start && msfconsole -q
db_status
setg RHOSTS 10.2.24.113
setg RHOST 10.2.24.113
workspace -a TOMCAT
  • Perform an nmap scan directly into MSF

db_nmap -sS -sV -O 10.2.24.113
db_nmap -sS -sV -O 10.2.24.113
  • Try tomcat from a browser

    • http://10.2.24.113:8080/

  • Or use a specific payload

  • A CMD shell session is provided

Reveal Flag: 🚩

92d60a06d0ea2179c9a8c442c0bd0bc0

  • Obtain a Meterpreter session

  • Generate a Windows meterpreter payload. Open a new terminal tab

  • In the first msfconsole tab

  • Terminate the python web server and set up the handler in the second tab

  • Execute the meterpreter.exe on the target system

  • Reverse Meterpreter session will be opened.


Last updated

Was this helpful?