🔬Tomcat - MSF Exploit
Last updated
Last updated
Target IP:
10.2.24.113
Exploit the target with the appropriate Metasploit Framework module
Perform an nmap
scan directly into MSF
Try tomcat from a browser
http://10.2.24.113:8080/
Or use a specific payload
A CMD shell session is provided
Obtain a Meterpreter
session
Generate a Windows meterpreter
payload. Open a new terminal tab
In the first msfconsole
tab
Terminate the python web server and set up the handler in the second tab
Execute the meterpreter.exe
on the target system
Reverse Meterpreter
session will be opened.