Jerry

10.10.10.95

Scanning and Enumeration

└─$ nmap -sC -sV -p 8080 10.10.10.95 -Pn
Host discovery disabled (-Pn). All addresses will be marked 'up' and scan times will be slower.
Starting Nmap 7.91 ( https://nmap.org ) at 2021-02-14 17:04 EST
Nmap scan report for 10.10.10.95
Host is up (0.10s latency).

PORT     STATE SERVICE VERSION
8080/tcp open  http    Apache Tomcat/Coyote JSP engine 1.1
|_http-favicon: Apache Tomcat
|_http-server-header: Apache-Coyote/1.1
|_http-title: Apache Tomcat/7.0.88

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 12.02 seconds

Web Page found

Found Credentials

Attempting Brute Force with HYDRA

As you can see, we were able to obtain 2 credentials, both of which were found. We forwarded our request to the burp proxy.

Enumerating the webpage we find something speacial, an upload section. We can also tell that this is a windows machine. Take a look here.

Lets try to upload a war file. Note, that a war file is like a zip file so we may have to find a jsp file, which are included in war files and make sure that that jsp file is a spooky file.

Generating a shell and establishing connection

Last updated

Was this helpful?