﻿1
00:00:00,590 --> 00:00:02,660
‫Now, when you're finished with an XPoint.

2
00:00:03,650 --> 00:00:08,630
‫You can pick another one directly by using the U.S command like this.

3
00:00:10,270 --> 00:00:16,270
‫Or you can use the back and then utilize the new one by the EU's command.

4
00:00:17,710 --> 00:00:19,270
‫That's pretty much how I work.

5
00:00:20,270 --> 00:00:22,460
‫Then show the exploit options.

6
00:00:23,770 --> 00:00:28,870
‫Now, for this point, I will define a payload by setting the payload variable.

7
00:00:30,310 --> 00:00:33,250
‫Set payload java.

8
00:00:34,270 --> 00:00:38,680
‫Met Interpretor Reverse TCAP.

9
00:00:40,860 --> 00:00:49,620
‫So I don't set the host variable, but in the previous video, I define it as a global variable named.

10
00:00:51,360 --> 00:01:01,050
‫And also, there are some new variables under this payload section L. host and L Port because I chose

11
00:01:01,050 --> 00:01:03,090
‫a reverse TCP connection.

12
00:01:04,060 --> 00:01:09,640
‫Which means that after a successful exploitation, the target will connect back to me.

13
00:01:10,550 --> 00:01:21,270
‫So our host in this context is the IP address of Carly and Al Port is the port that is ready to connect

14
00:01:21,590 --> 00:01:22,160
‫to Carly.

15
00:01:23,240 --> 00:01:28,110
‫Its default value is four four four four, and I don't want to change that.

16
00:01:28,850 --> 00:01:33,430
‫I will only set the host to 10, not 10.

17
00:01:33,470 --> 00:01:35,360
‫Not to not one one.

18
00:01:36,480 --> 00:01:46,050
‫Then said HTP password to Tomcat, said HTP username to Tomcat.

19
00:01:47,210 --> 00:01:50,870
‫Now, it isn't necessary, but I can set the target to zero.

20
00:01:51,920 --> 00:01:58,670
‫Or I forgot the airport, so let's set the iReport to 80, 180.

21
00:02:00,420 --> 00:02:02,490
‫OK, so let me check it one more time.

22
00:02:03,760 --> 00:02:05,220
‫OK, yeah, everything looks good.

23
00:02:06,580 --> 00:02:08,140
‫Now exploit.

24
00:02:09,920 --> 00:02:16,010
‫So it doesn't take too much time and I have the interpreter session on Matus voidable to.

25
00:02:17,880 --> 00:02:22,440
‫But this time, let's have a look at the user Tomcat 55.

26
00:02:23,330 --> 00:02:25,220
‫It is not the route user.

27
00:02:25,990 --> 00:02:30,350
‫So this means actually you don't have a high privileged shell.

28
00:02:31,160 --> 00:02:37,790
‫So I'm going to send this session to the background by using the interpreter command.

29
00:02:39,220 --> 00:02:42,110
‫So this is my session's list in the background.

30
00:02:42,910 --> 00:02:45,400
‫OK, so I want to show you a couple more command.

31
00:02:46,630 --> 00:02:53,470
‫Push em and pop em, push em will push the current module to stack.

32
00:02:54,160 --> 00:03:01,480
‫Now I will push this XPoint to stack, then I can pick another one RMI registry XPoint.

33
00:03:02,780 --> 00:03:10,100
‫And I'll run it and I get another session, so as you can see here, I am working with RMI Registry

34
00:03:10,100 --> 00:03:19,610
‫exploit with the pop em, I'll pop the last module from the stack and it's the Tomcat manager exploit,

35
00:03:19,610 --> 00:03:21,650
‫as you see here on your screen.

36
00:03:21,860 --> 00:03:29,510
‫So I'll advise you to do this, because when you're doing some really quick exploitation, those last

37
00:03:29,510 --> 00:03:32,600
‫two commands come in super handy.

