The document details steps taken in a penetration test. It found an Apache Struts vulnerability at http://192.168.35.101/orders/orders using Gobuster and an exploit script. Running linpeas.sh revealed a hashed password, which was cracked online as adminPass1234. SSH access was then gained as tomcat@192.168.35.101.
The document details steps taken in a penetration test. It found an Apache Struts vulnerability at http://192.168.35.101/orders/orders using Gobuster and an exploit script. Running linpeas.sh revealed a hashed password, which was cracked online as adminPass1234. SSH access was then gained as tomcat@192.168.35.101.
The document details steps taken in a penetration test. It found an Apache Struts vulnerability at http://192.168.35.101/orders/orders using Gobuster and an exploit script. Running linpeas.sh revealed a hashed password, which was cracked online as adminPass1234. SSH access was then gained as tomcat@192.168.35.101.
The document details steps taken in a penetration test. It found an Apache Struts vulnerability at http://192.168.35.101/orders/orders using Gobuster and an exploit script. Running linpeas.sh revealed a hashed password, which was cracked online as adminPass1234. SSH access was then gained as tomcat@192.168.35.101.