Where did you get the vulnerable Apache Tomcat machine? Great video thanks.
@elevatecyber50313 жыл бұрын
It was a HacktheBox machine if I remember correctly
@InfiniteLogins4 жыл бұрын
Thanks for the video! Excited to see this one.
@brucemoose9264 жыл бұрын
I was looking for help with CSRF_NONCE=some long string when I deploy a war file. Any ideas?
@SuperTechrobin3 жыл бұрын
super cool video sir thanks sir
@user-tg6vk4ig3i4 жыл бұрын
Really good. I hope you continue this series
@InsaneRecords9972 жыл бұрын
Hey bro what to do if default credentials don't work?
@elevatecyber50312 жыл бұрын
It uses basic auth so you can brute force it.
@AketzaCitoresFranco Жыл бұрын
good video!
@goodboy88333 жыл бұрын
Wow this channel is like Goldmine
@javiporras33963 жыл бұрын
good one !
@meheshpavan31934 жыл бұрын
how to get root access?
@elevatecyber50314 жыл бұрын
It all depends what account is running the apache tomcat service when you exploit it. If it the root account, you'll get root, if it's www, you'll only have the access level of that account
@meheshpavan31934 жыл бұрын
@@elevatecyber5031 yeah I only got access as tomcat7 , for privilege escalation I tried the linux exploits but nothing worked. Anything you wanna suggest .
@flapcat4681 Жыл бұрын
@@meheshpavan3193there's too many variables to give any actionable advice on this. Try putting linpeas on the machine and running it, then read over the output and see what's on the box itself