Skip to content

Tomcat #58

@AI0TSec

Description

@AI0TSec

BurpSuite

访问http://host:port/manager/html

image

Burp抓包进行暴力破解

image

查看请求包,发现将输入的账号、密码重新编码为Base64密文:用户名:密码 > admin:admin > YWRtaW46YWRtaW4=

GET /manager/html HTTP/1.1
Host: 192.168.100.17:8080
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:71.0) Gecko/20100101 Firefox/71.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Referer: http://192.168.100.17:8080/
Connection: close
Cookie: JSESSIONID=C415245CC7B4597217A5869528EFB776
Upgrade-Insecure-Requests: 1
Cache-Control: max-age=0
Authorization: Basic YWRtaW46YWRtaW4=

image

发送至Intruder模块,标记暴力破解变量(YWRtaW46YWRtaW4=),选择攻击类型(Sniper)
image

Payload设置,类型选择Custom iterator自定义迭代器,设置三个迭代payload分别代表:用户名
: 密码

用户名攻击载荷设置

image

:攻击载荷设置

image

密码攻击载荷设置

image

设置编码器(Base64)
image

取消勾选
image

进行爆破
image

工具/脚本

image

image

Metasploit

use auxiliary/scanner/http/tomcat_mgr_login

image
image

Metadata

Metadata

Assignees

No one assigned

    Labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions