🔬Tomcat - MSF Exploit
Lab 1
Target IP:
10.2.24.113
Exploit the target with the appropriate Metasploit Framework module
Perform an
nmap
scan directly into MSF
Try tomcat from a browser
http://10.2.24.113:8080/
Or use a specific payload
A CMD shell session is provided
Obtain a
Meterpreter
session
Generate a Windows
meterpreter
payload. Open a new terminal tab
In the first
msfconsole
tab
Terminate the python web server and set up the handler in the second tab
Execute the
meterpreter.exe
on the target system
Reverse
Meterpreter
session will be opened.
Last updated