Premise
In this video walk-through, we demonstrated the exploitation process of the windows server attached to the Metasploitable 3 lab box. During the enumeration, we discovered an unauthenticated way to the Jenkins server and uploaded a payload to the Tomcat server that gave us back a privileged shell.
Machine Name: Metasploitable 3
Skills Learned
- Jenkins Server exploitation
- Tomcat Server
- Windows server exploitation
Video Walk-through
Show Comments