From the course: Kali Linux for Advanced Pen Testing and Ethical Hacking
Unlock the full course today
Join today to access over 24,700 courses taught by industry experts.
Exploiting Tomcat - Linux Tutorial
From the course: Kali Linux for Advanced Pen Testing and Ethical Hacking
Exploiting Tomcat
- Let's take a look at what's running on port 8180 on our Metasploitable server. We'll go directly to the website. 10.0.2.8:8180 And we can say it's a Tomcat server. We have links to the manager and administrator. Let's open the manager portal, and we know that tomcat, when it's installed has credentials, default credentials, tomcat. tomcat, So let's say if they work and they do, and we have the Tomcat application manager showing the applications running in Tomcat, and we have the ability to deploy more applications, either from the Tomcat server or from our system. Just go back to the main menu and have a look at Tomcat administration. We might again try the default credentials, tomcat, tomcat, and we can get into the administration tool. We've now got complete control over the Tomcat web server. Controlling the web service fine, but we really want to control the total system. Kali provides us with a means of creating…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
(Locked)
Targeting Metasploitable44s
-
(Locked)
Exploiting VSFTPD3m 22s
-
(Locked)
Exploiting with ProFTPD4m 52s
-
(Locked)
Exploiting Tomcat2m 58s
-
(Locked)
Exploiting IRC1m 23s
-
(Locked)
Exploiting the distributed compile system1m 35s
-
(Locked)
Exploiting network files2m 59s
-
(Locked)
Hiding in plain sight43s
-
(Locked)
Escalating to root5m 18s
-
(Locked)
-
-
-
-