eCPPT - Client-Side Attacks CTF 1

,

I am stuck on Task 3: Exploit a vulnerable file server on web.prod.local. Any guidance would be appreciated :slight_smile:

I know the server is Rejetto HttpFileServer httpd 2.3 after enumeration and using remote port forwarding. Also setup the autoroute through Meterpreter so can ping it from the first compromised host, mail.server.local. Been trying to use the rejetto_hfs_exec metasploit module, i’ve tried a bind shell and a reverse_tcp shell but am unable to exploit web.prod.local. Can someone explain to me what I am doing wrong please

I have the same issue. I’ve tried attacking web.prod.local in every possible way, but nothing works.
I thought there might be a problem with the lab, so I contacted support, but they told me everything is working fine and that the rejetto_hfs_exec module is not the correct method.

Ahh good to know mate, least that can be ruled out! If you find a solution please post it back here, been stuck on this for ages!

I’ve been struggling with this one as well. I have used both different rejetto exploits. With different payloads, tried it with proxies and with port-forwarding.

No matter what I do it seems I am never able to get a shell. I have reached a point where I am not sure what I am supposed to be trying next anymore.