Tomcat 8080
1. Check Default Directories
2. Check for Default Credentials
Some of the common usernames and passwords are:
Username List: admin, tomcat, manager, root
Password List: manager, password, root, tomcat, s3cret
3. Run Nikto Scan
4. Generate Reverse Shell Payload
5. Brute Force with Hydra
6. Using tomcatWarDeployer.py
for Upload
tomcatWarDeployer.py
for UploadThe tomcatWarDeployer.py
script can automate the process of uploading and deploying a reverse shell .war
file to Tomcat. Clone the repository and use the script as follows:
To deploy a reverse shell:
<username>: The username for authentication.
<password>: The password for authentication.
<ATTACKER_IP>: Your attacker's IP.
<ATTACKER_PORT>: The port you want the reverse shell to connect to.
<VICTIM_IP>: The target's IP address.
For a bind shell instead of a reverse shell:
7. Metasploit Scanner for Tomcat
Metasploit has an auxiliary scanner that can quickly check for Tomcat Manager login vulnerabilities:
Last updated