Enumeration
Last updated
Last updated
After completing the setup, begin the enumeration phase.
On Kali Linux, use netdiscover
to identify machines in the network:
After identifying the victim machine's IP address, perform further enumeration using Nmap:
It usually runs on port 8080
Common Tomcat error:
To find the version of Apache Tomcat, a simple command can be executed:
Copy
This will search for the term "Tomcat" in the documentation index page, revealing the version in the title tag of the HTML response.
The /manager/html directory is highly sensitive, as it allows WAR file uploads for potential code execution. Common credentials to test include:
admin:admin
tomcat:tomcat
admin:
admin:s3cr3t
tomcat:s3cr3t
admin:tomcat
You can test these using:
Another directory to monitor is /manager/status, which reveals the Tomcat and OS version, aiding in vulnerability assessment.
To brute force the /manager/html directory, use tools like Hydra: