Jetty Pentest
Send a GET request to / with a random value in the Host header, the response will contain a list of all applications
upload a JSP web shell to $JETTY_BASE/webapps/root/
$JETTY_BASE/webapps/root/
Test with this two types of payload:
XML-based: <a:script xmlns:a="http://www.w3.org/1999/xhtml">alert('PTSWARM')</script>
<a:script xmlns:a="http://www.w3.org/1999/xhtml">alert('PTSWARM')</script>
HTML-based: <script>alert('PTSWARM')</script>
<script>alert('PTSWARM')</script>
Disclaimer: As an Amazon Associate, I earn from qualifying purchases. This helps support this GitBook project at no extra cost to you.
The Web Application Hacker’s Handbookarrow-up-right The go-to manual for web app pentesters. Covers XSS, SQLi, logic flaws, and more
Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilitiesarrow-up-right Learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them
Real-World Bug Hunting: A Field Guide to Web Hackingarrow-up-right Learn about the most common types of bugs like cross-site scripting, insecure direct object references, and server-side request forgery.
Last updated 8 months ago