首页 > 其他分享 >HTB:Jerry[WriteUP]

HTB:Jerry[WriteUP]

时间:2024-10-13 18:21:19浏览次数:15  
标签:Web HTB Tomcat WriteUP Jerry Application Manager IP 靶机

目录

连接至HTB服务器并启动靶机

1.Which TCP port is open on the remote host?

2.Which web server is running on the remote host? Looking for two words.

3.Which relative path on the webserver leads to the Web Application Manager?

4.What is the valid username and password combination for authenticating into the Tomcat Web Application Manager? Give the answer in the format of username:password

在弹出的验证界面中,随便输入一个账户密码,使用Yakit进行抓包

5.Which file type can be uploaded and deployed on the server using the Tomcat Web Application Manager?

6.Submit the flag located on the user's desktop.

USER_FLAG:7004dbcef0f854e0fb401875f26ebd00

7.Submit the flag located on the administrator's desktop.

ROOT_FLAG:04a8b36e1545a455393d067e772fe90e


连接至HTB服务器并启动靶机

靶机IP:10.10.10.95

分配IP:10.10.16.7


1.Which TCP port is open on the remote host?

使用nmap对靶机开放端口进行扫描:

nmap -p- -T4 --min-rate=1000 -sS -Pn {TARGET_IP}

由扫描结果可见,靶机仅开放8080端口


2.Which web server is running on the remote host? Looking for two words.

使用nmap对靶机8080端口进行脚本、服务信息扫描:

由扫描结果可见,http-favicon:Apache Tomcat


3.Which relative path on the webserver leads to the Web Application Manager?

使用浏览器访问靶机URL:http://{TARGET_IP}:8080

在主页面右侧可以看到Manager App,点击进入管理页面:/manager/html


4.What is the valid username and password combination for authenticating into the Tomcat Web Application Manager? Give the answer in the format of username:password

在弹出的验证界面中,随便输入一个账户密码,使用Yakit进行抓包

通过Authorization一栏,解码后可以看出凭证格式是:Base64_Encode(账号:密码)

使用WebFuzzer模块对凭证请求构造一下,使用字典进行爆破:

获取凭证:tomcat:s3cret


5.Which file type can be uploaded and deployed on the server using the Tomcat Web Application Manager?

使用凭证对管理页面进行登录,往下拉可以找到文件部署处:

在文件部署的下方可以看到文件上传处,支持上传war类型的文件


6.Submit the flag located on the user's desktop.

先用哥斯拉生成一个Webshell:

将shell.jsp文件打包成war文件:

jar -cvf webshell.war *

将webshell.war文件上传至靶机tomcat服务器中:

点击webshell,自动跳转至shell.jsp路径下:http://{TARGET_IP}:8080/webshell/

使用哥斯拉连接至shell.jsp:

这里直接可以图形化查看内容:C:/Users/Administrator/Desktop/flags/2 for the price of 1.txt

USER_FLAG:7004dbcef0f854e0fb401875f26ebd00


7.Submit the flag located on the administrator's desktop.

直接用命令行直接查看文件内容也可以,在文件名左右加上双引号即可:

ROOT_FLAG:04a8b36e1545a455393d067e772fe90e

标签:Web,HTB,Tomcat,WriteUP,Jerry,Application,Manager,IP,靶机
From: https://blog.csdn.net/qq_43007452/article/details/142899341

相关文章

  • HTB:Lame[WriteUP]
    目录连接至HTB服务器并启动靶机1.Howmanyofthenmaptop1000TCPportsareopenontheremotehost?2.WhatversionofVSFTPdisrunningonLame?3.ThereisafamousbackdoorinVSFTPdversion2.3.4,andaMetasploitmoduletoexploitit.Doesthatexploi......
  • HTB:Legacy[WriteUP]
    目录连接至HTB服务器并启动靶机1.HowmanyTCPportsareopenonLegacy?2.Whatisthe2008CVEIDforavulnerabilityinSMBthatallowsforremotecodeexecution?3.WhatisthenameoftheMetasploitmodulethatexploitsCVE-2008-4250?4.WhenexploitingM......
  • HTB buff wp
    难度:easy初步端口扫描:开了两个端口,7680没有什么信息,8080是web服务,进去看一下,在concat.php发现版本信息searchsploit搜一下,发现payload,选用48506这个脚本修改一下脚本,不用他给的交互式shell(太难用了),在写入的php文件中加入文件上传功能,弹回来个shell,用msf收一下直接用mu......
  • NewStarCtf 2024第一周writeup
    有几道题没写出来,但还是希望能够帮到大家理解更多的CTF知识Signin操作内容:做选择题得出flag。flag值:flag{I_Agr3e_to_FoL10w_th3_ru1es_c41fa97d}MISC兑换码操作内容:题目提示flag在图片下方,010修改图片宽度,得到flag。flag值:flag{La_vaguelette}MISCLabyrinth操......
  • 【极客大挑战2023】- Re -点击就送的逆向题 WriteUp
    这道题给了一个.s文件解决方案有两个:1.利用gcc编译成可执行文件,然后反编译生成伪代码2.直接分析汇编(我不会。。。)1.利用gcc编译成可执行文件linux执行gcc-o1.s1IDA打开,分析并编写,注意一定要在字符串末尾加上\0结束符!!!点击查看代码#include<stdio.h>intmain(void){......
  • 【极客大挑战2023】RE方向 WriteUp
    1.砍树下载题目得到一个apk文件,jadx打开,查看Android.Manifest.xml查看MainActivity发现使用了一个I0o0I处理了输入和Syclover,猜测应该是对text处理后与Syclover对比,当result赋值为1就成功了。故查看I0o0I发现I0o0I再so文件中,故查看libezreeeee.so文件IDA打开,查找I0o0I生......