Jerry
Write up for the HTB machine 'Jerry'
1. Initial recon
1.1. nmap
nmap -sC -sV 10.10.10.95 -Pn
from the nmap scan we can navigate to 10.10.10.95:8080
clicking on the manager page we are prompted to enter some credentials trying the usual
we are met with a 403 page that contains some default credentials
surely enough those work when we are prompted to log in again
2. RCE
after uploading the file for the reverse shell, and running a netcat listener, we can navigate to /revshell
on the web server to catch it
3. user and root!
a simple whoami
in our rev shell reveals that we are already nt authority\system
so let's just search for our flags
we can find them at C:\Users\Administrator\Desktop\flags\2 for the price of 1.txt
and simply running type "2 for the price of 1.txt"
in the flag directory will reveal both our user and root flags.
Last updated
Was this helpful?