Jerry
Write up for the HTB machine 'Jerry'
1. Initial recon
1.1. nmap
nmap -sC -sV 10.10.10.95 -Pn
from the nmap scan we can navigate to 10.10.10.95:8080
clicking on the manager page we are prompted to enter some credentials trying the usual
we are met with a 403 page that contains some default credentials
surely enough those work when we are prompted to log in again
2. RCE
looking through the manager portal at /manager/html
we can see that there is an option to upload WAR files. we can find a msfvenom
reverse shell for the war file on HackTricks
after uploading the file for the reverse shell, and running a netcat listener, we can navigate to /revshell
on the web server to catch it
3. user and root!
a simple whoami
in our rev shell reveals that we are already nt authority\system
so let's just search for our flags
we can find them at C:\Users\Administrator\Desktop\flags\2 for the price of 1.txt
and simply running type "2 for the price of 1.txt"
in the flag directory will reveal both our user and root flags.
Last updated