An easy box by mrh4sh. Really simple box in the same venue as Lame, Blue, Grandma/Grandpa. Great for those starting out to attempt.
Discovery/Enumeration
Recently I discovered a pretty cool tool for discovery called RECONNOITRE. I had been using Sparta in the past but I really liked how this one ran in the command line and saved its findings automatically.
Right away it found a web server running on TCP/8080, it also provides a couple of decent tips for how to procede in enumeration. Note that sometimes the commands have syntax errors in them, probably something that is fixable…
Browsing to http://10.10.10.95:8080/ we are greeted by Apache Tomcat, oh how I like Tomcat.
By default old version of tomcat use tomcat:s3cret to authenticate. There are a couple other defaults out there as well depending on the versions. lets try those and see if that gives us access.
Exploitation
Awesome, and we have the opportunity to upload our own WAR file. This should make for an easy shell. To create the malicious payload we can use msfvenom:
I try to give my payloads a rather descriptive name for these CTF’s in the event I need to rebuild or reuse one. Scroll down to WAR file to deploy and upload the output of msfvenom.
And prepare a multi/handler to catch the session in Metasploit. If you are trying to keep it Metasploit-free a netcat session would work here as well using the java/jsp_shell_reverse_tcp payload instead. Click on the link for the name to get your shell.