Jerry
10.10.10.95
Scanning and Enumeration
ββ$ nmap -sC -sV -p 8080 10.10.10.95 -Pn
Host discovery disabled (-Pn). All addresses will be marked 'up' and scan times will be slower.
Starting Nmap 7.91 ( https://nmap.org ) at 2021-02-14 17:04 EST
Nmap scan report for 10.10.10.95
Host is up (0.10s latency).
PORT STATE SERVICE VERSION
8080/tcp open http Apache Tomcat/Coyote JSP engine 1.1
|_http-favicon: Apache Tomcat
|_http-server-header: Apache-Coyote/1.1
|_http-title: Apache Tomcat/7.0.88
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 12.02 secondsWeb Page found

Found Credentials

Attempting Brute Force with HYDRA

As you can see, we were able to obtain 2 credentials, both of which were found. We forwarded our request to the burp proxy.
Enumerating the webpage we find something speacial, an upload section. We can also tell that this is a windows machine. Take a look here.

Lets try to upload a war file. Note, that a war file is like a zip file so we may have to find a jsp file, which are included in war files and make sure that that jsp file is a spooky file.
Generating a shell and establishing connection
Last updated
Was this helpful?