ApacheTomcatScanner - A Python Script To Scan For Apache Tomcat Server Vulnerabilities
A python script to scan for Apache Tomcat server vulnerabilities.
Features
- Multithreaded workers to search for Apache tomcat servers.
- Multiple target source possible:
- Retrieving list of computers from a Windows domain through an LDAP query to use them as a list of targets.
- Reading targets line by line from a file.
- Reading individual targets (IP/DNS/CIDR) from
-tt/--target
option.
- Custom list of ports to test.
- Tests for
/manager/html
access and default credentials. - List the CVEs of each version with the
--list-cves
option
Installation
You can now install it from pypi with this command:
sudo python3 -m pip install apachetomcatscanner
Usage
$ ./ApacheTomcatScanner.py -hApache Tomcat Scanner v2.3.2 - by @podalirius_usage: ApacheTomcatScanner.py [-h] [-v] [--debug] [-C] [-T THREADS] [-s] [--only-http] [--only-https] [--no-check-certificate] [--xlsx XLSX] [--json JSON] [-PI PROXY_IP] [-PP PROXY_PORT] [-rt REQUEST_TIMEOUT] [-tf TARGETS_FILE] [-tt TARGET] [-tp TARGET_PORTS] [-ad AUTH_DOMAIN] [-ai AUTH_DC_IP] [-au AUTH_USER] [-ap AUTH_PASSWORD] [-ah AUTH_HASH]A python script to scan for Apache Tomcat server vulnerabilities.optional arguments: -h, --help show this help message and exit -v, --verbose Verbose mode. (default: False) --debug Debug mode, for huge verbosity. (default: False) -C, --list-cves List CVE ids affecting each version found. (default: False) -T THREADS, --threads THREADS Number of threads (default: 5) -s, --servers-only If querying ActiveDirectory, only get servers and not all computer objects. (default: False) --only-http Scan only with HTTP scheme. (default: False, scanning with both HTTP and HTTPs) --only-https Scan only with HTTPs scheme. (default: False, scanning with both HTTP and HTTPs) --no-check-certificate Do not check certificate. (default: False) --xlsx XLSX Export results to XLSX --json JSON Export results to JSON -PI PROXY_IP, --proxy-ip PROXY_IP Proxy IP. -PP PROXY_PORT, --proxy-port PROXY_PORT Proxy port -rt REQUEST_TIMEOUT, --request-timeout REQUEST_TIMEOUT -tf TARGETS_FILE, --targets-file TARGETS_FILE Path to file containing a line by line list of targets. -tt TARGET, --target TARGET Target IP, FQDN or CIDR -tp TARGET_PORTS, --target-ports TARGET_PORTS Target ports to scan top search for Apache Tomcat servers. -ad AUTH_DOMAIN, --auth-domain AUTH_DOMAIN Windows domain to authenticate to. -ai AUTH_DC_IP, --auth-dc-ip AUTH_DC_IP IP of the domain controller. -au AUTH_USER, --auth-user AUTH_USER Username of the domain account. -ap AUTH_PASSWORD, --auth-password AUTH_PASSWORD Password of the domain account. -ah AUTH_HASH, --auth-hash AUTH_HASH LM:NT hashes to pass the hash for this user.
Example
You can also list the CVEs of each version with the --list-cves
option:
Contributing
Pull requests are welcome. Feel free to open an issue if you want to add other features.
Source: www.kitploit.com
ApacheTomcatScanner - A Python Script To Scan For Apache Tomcat Server Vulnerabilities
Reviewed by Zion3R
on
5:53 AM
Rating: