Exploiting Apache Tomcat & Abusing LXD Membership for PrivEsc
Tabby is a linux box rate as easy. We need to get /etc/tomcat9/tomcat-users.xml file to collect credential through LFI. Then, we could upload WAR file to victim to gain initial shell. To move into ash shell, we have to crack the backup zip file. To escalate into root, we could abusing lxd group membership to obtain root privilege.
lxd WAR Tomcat9 fcrackzip