Jerry

Jerry is pretty easy but provides a great example as to the dangers of default credentials

Start with an nmap scan.

Okay this looks like a web server, lets visit it
Some good info here, it looks like a default webpage, use nikto and gobuster to enumerate further.
With our scans running in the background, poke around the website some more
Some more good info
here I am looking for php files, note the -x option.
Okay this is really bad, it looks like we can login to the server now
Look up a script for a reverse shell, here I am using the msfvenom generate java shell
Browse to the upload a file section and upload your reverse shell script, verify the new url.
Visit the page to execute
Our shell should connect to the target, looks like we have nt authority, very nice.
Now we are free to locate the flags. use the type command and quotes to get both!

Leave a comment