– Looking at our Foothold machine, we found a file named access-creds.txt. It is likely that this file contains login credentials for various applications.
– Proceed to log in and look for a place where we can upload a shell. The Tomcat Manager previously had a vulnerability related to file uploads.
– After identifying the vulnerable file upload location, we attempt to upload a shell. This application only accepts files with the .war extension. Therefore, we will use msfvenom to generate a reverse shell with a .war extension.