HackTheBox Writeup— Jerry

Hello Guys , I am Faisal Husaini. My username on HTB is “smoke” .

This was pretty easy box , but it had nice techniques and I learn about exploiting vulnerable TomCat Server , it was fun doing this box

The IP for this machine is

We run the nmap scan using the command “nmap -sC -sV -oA nmap”

NMAP Results

As the nmap scan blocking our ping probes , we gave an extension -Pn

Now we see that port 8080 is open and is running http service of Apache Tomcat/Coyote JSP engine 1.1

Apache Tomcat

We run the IP in the browser and we get the default or normal Apache Tomcat server page

Let’s now run dirb scan


We got many directories , interesting ones look host-manager and manager , lets see what it has

Here when we tried to access

It prompted for username and password , so I tried random username and passwords like admin/admin or root/admin etc.

But no luck , then when I clicked on Cancel button , I was redirected to this page

403 Access Denied

Here we clearly see that username=”tomcat” and password=”s3cret” , which by first I thought was a leak from the server , but after researching I came to know that it is the Apache Tomcat default username/password.

I tried to re-enter this as username and password , but it didn't prompted me due to the cookie stored , so I will try this on and see what it shows

So here we try to access , we get

Tomcat Web Application Manager

Scrolling down more , we see

WAR File Upload Section

We see that we can upload a WAR file , now lets begin some enumeration and google

So after doing google searches and enumeration , I came to know that we can upload WAR files and also we can create a msf payload using msfvenom in WAR format , so lets do it

Here we create a WAR format backdoor to upload in the Tomcat manager and then access it to get the reverse shell

msfvenom to create WAR backdoor

Payload created , now lets upload it

Now we upload our created backdoor “faisal.war” in the Tomcat manager

WAR File Upload

Now we click on Deploy

Backdoor Uploaded

Our backdoor has been uploaded and now we can access it using the URL

Before we access , we need to set up a listener


Boom , we got shell just after accessing the backdoor link

Now lets see which user we are


Woaah , we are already now to NT Authority\system so we don't need to do privilege escalation

We saw there was a folder names flags in C:\Users\Administrator\Desktop


Inside of it had a txt file name as “2 for the price of 1.txt” , when we tried to read it from the shell , the shell died , I did many times , but again same thing happened

So , now I create a windows backdoor in exe format using msfvenom and then uploaded it using powershell command Invoke-WebRequest and then set up another listener in msfconsole to get a meterpreter shell

Setting up a meterpreter

Now we try to read the txt file from meterpreter or else download it to our machine

Getting Flags

We couldn't read it , so i tried downloading it my box and it downloaded , now lets see what it has

The Flags

Boom , we got both the user flag and root flag

WAR File Backdoor Upload At Apache Tomcat


Below are the links for the resources which helped me in solving this box



Hacker | Bug Hunter | Python Coder | Gamer | Reverse Engineering Lover

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store