enumeration
1. Tomcat Version Detection
Methods:
curl -I http://target:port/ | grep -i "Server"curl -s http://target:port/docs/ | grep -i "Apache Tomcat"curl -s http://target:port/nonexistentpage
2. Tomcat Directory Structure (Key Files)
3. Manager Application Enumeration
Directory Brute-forcing:
Authentication Checks:
4. Tomcat Credential Enumeration
tomcat-users.xml Enumeration:
web.xml Enumeration:
5. WAR File Upload (Remote Code Execution)
6. JMX Enumeration & Exploitation
Using jmxterm:
Using Metasploit:
7. Connector Enumeration
AJP Connector:
8. Web Application Enumeration
Directory & File Enumeration:
Parameter Fuzzing:
9. Configuration File Enumeration
10. CVE Enumeration & Exploitation
Important Considerations
Summary of Key Findings
Last updated