The Live Engagement

April 30, 2024

First we have to login into the ip that was given

RDP to 10.129.86.5 with user "htb-student" and password "HTB_@cademy_stdnt!"

First we have to nmap scan the first host which is the 172.16.1.11

Then we will seach for exploit for the web server tomcat

But it failed

It tried both the IP but still failed

Then we are going to change the payload for the exploit

Click the Manager App

Upload a war file

After several to upload the war reverse shell it became successful

Set up a listener and go access the shell

  • Second host - 172.16.1.12 or blog.inlanefrieght.local

Use reload_all to refresh the modules in msfconsole

  • Third host - 172.16.1.13

Last updated