Tomcat Discovery & Enumeration
π― Objective: Master the identification, enumeration, and intelligence gathering techniques for Apache Tomcat servlet containers to uncover Java-based application attack surfaces and administrative interfaces in enterprise environments.
Overview
Apache Tomcat represents a critical attack surface in enterprise environments, serving as the open-source servlet container for Java applications including Spring Framework, Gradle builds, and custom enterprise applications. With over 220,000 live websites and 904,000+ historical deployments, Tomcat often provides high-value targets for internal network penetration and external footholds into corporate infrastructure.
Key Tomcat Statistics:
220,000+ active Tomcat websites globally (BuiltWith data)
904,000+ historical deployments across internet infrastructure
1.22% of top 1 million websites use Tomcat (3.8% of top 100k)
Position #13 in web server market share rankings
Major users: Alibaba, USPTO, American Red Cross, LA Times
Enterprise Deployment Patterns:
External exposure: Less common but high-impact when discovered
Internal prevalence: Multiple instances per environment (common)
EyeWitness priority: First position under "High Value Targets"
Configuration issues: Frequent weak/default credential usage
Tomcat Architecture & Components
Core Directory Structure
Standard Tomcat Installation Layout
Web Application Structure
Standard WAR Application Layout
Critical Configuration Files
web.xml - Deployment Descriptor
tomcat-users.xml - User Authentication
Discovery & Fingerprinting Techniques
HTTP Header Analysis
Method 1: Server Header Detection
Method 2: Error Page Fingerprinting
Method 3: Standard Application Detection
Documentation Page Analysis
/docs Directory Enumeration
Examples Application Analysis
Advanced Fingerprinting Methods
JSP Engine Detection
JVM Information Gathering
Administrative Interface Discovery
Manager Application Enumeration
/manager Interface Discovery
Manager Application Functionality
Host Manager Discovery
Default Credential Testing
Common Tomcat Credentials
Automated Credential Testing
Application and Service Enumeration
Directory and File Discovery
Gobuster Enumeration
Application-Specific Discovery
WAR File and JSP Discovery
JSP Page Enumeration
WAR File Analysis
Configuration File Analysis
tomcat-users.xml Reconnaissance
User and Role Analysis
Security Constraint Analysis
server.xml Analysis
Connector and Port Configuration
Virtual Host Enumeration
HTB Academy Lab Solutions
Lab 1: Tomcat Version Detection
Question: "What version of Tomcat is running on the application located at http://web01.inlanefreight.local:8180?"
Solution Methodology:
Step 1: Environment Setup
Step 2: Version Detection Methods
Step 3: Expected Answer Extraction
Lab 2: Admin User Role Analysis
Question: "What role does the admin user have in the configuration example?"
Solution Methodology:
Step 1: Configuration File Analysis
Step 2: Role Analysis
Step 3: Role Functionality Understanding
Intelligence Gathering Workflow
Systematic Tomcat Assessment
Phase 1: Discovery & Fingerprinting
Phase 2: Administrative Interface Assessment
Phase 3: Application Analysis
Phase 4: Vulnerability Research
Enterprise Deployment Patterns
Internal Network Reconnaissance
Multi-Instance Discovery
Load Balancer Detection
Development vs Production Discrimination
Environment Identification
Security Assessment Priorities
High-Value Target Identification
EyeWitness Integration
Risk Prioritization
Next Steps
After Tomcat enumeration, proceed to:
Tomcat Attacks & Exploitation - WAR file uploads and manager abuse
Java Application Security - Servlet and JSP vulnerabilities
Jenkins Discovery - CI/CD infrastructure enumeration
π‘ Key Takeaway: Tomcat enumeration focuses on administrative interface discovery, version identification, and configuration analysis. Enterprise environments frequently contain multiple Tomcat instances with weak default credentials, making systematic enumeration crucial for identifying high-value attack vectors and internal network footholds.
Last updated