In this video walk-through, we demonstrated the exploitation process of the windows server attached to the Metasploitable 3 lab box. During the enumeration, we discovered an unauthenticated way to the Jenkins server and uploaded a payload to the Tomcat server that gave us back a privileged shell.

Machine Name: Metasploitable 3

Skills Learned

  • Jenkins Server exploitation
  • Tomcat Server
  • Windows server exploitation

Get OSCP Certificate Notes

Video Walk-through

About the Author

Cybersecurity Trainer MS in Cybersecurity Expertise in Healthcare and Finance Industries Penetration tester and compliance auditor

View Articles