Tomcat Discovery & Enumeration

🎯 Objective: Master the identification, enumeration, and intelligence gathering techniques for Apache Tomcat servlet containers to uncover Java-based application attack surfaces and administrative interfaces in enterprise environments.

Overview

Apache Tomcat represents a critical attack surface in enterprise environments, serving as the open-source servlet container for Java applications including Spring Framework, Gradle builds, and custom enterprise applications. With over 220,000 live websites and 904,000+ historical deployments, Tomcat often provides high-value targets for internal network penetration and external footholds into corporate infrastructure.

Key Tomcat Statistics:

  • 220,000+ active Tomcat websites globally (BuiltWith data)

  • 904,000+ historical deployments across internet infrastructure

  • 1.22% of top 1 million websites use Tomcat (3.8% of top 100k)

  • Position #13 in web server market share rankings

  • Major users: Alibaba, USPTO, American Red Cross, LA Times

Enterprise Deployment Patterns:

  • External exposure: Less common but high-impact when discovered

  • Internal prevalence: Multiple instances per environment (common)

  • EyeWitness priority: First position under "High Value Targets"

  • Configuration issues: Frequent weak/default credential usage


Tomcat Architecture & Components

Core Directory Structure

Standard Tomcat Installation Layout

Web Application Structure

Standard WAR Application Layout

Critical Configuration Files

web.xml - Deployment Descriptor

tomcat-users.xml - User Authentication


Discovery & Fingerprinting Techniques

HTTP Header Analysis

Method 1: Server Header Detection

Method 2: Error Page Fingerprinting

Method 3: Standard Application Detection

Documentation Page Analysis

/docs Directory Enumeration

Examples Application Analysis

Advanced Fingerprinting Methods

JSP Engine Detection

JVM Information Gathering


Administrative Interface Discovery

Manager Application Enumeration

/manager Interface Discovery

Manager Application Functionality

Host Manager Discovery

Default Credential Testing

Common Tomcat Credentials

Automated Credential Testing


Application and Service Enumeration

Directory and File Discovery

Gobuster Enumeration

Application-Specific Discovery

WAR File and JSP Discovery

JSP Page Enumeration

WAR File Analysis


Configuration File Analysis

tomcat-users.xml Reconnaissance

User and Role Analysis

Security Constraint Analysis

server.xml Analysis

Connector and Port Configuration

Virtual Host Enumeration


HTB Academy Lab Solutions

Lab 1: Tomcat Version Detection

Question: "What version of Tomcat is running on the application located at http://web01.inlanefreight.local:8180?"

Solution Methodology:

Step 1: Environment Setup

Step 2: Version Detection Methods

Step 3: Expected Answer Extraction

Lab 2: Admin User Role Analysis

Question: "What role does the admin user have in the configuration example?"

Solution Methodology:

Step 1: Configuration File Analysis

Step 2: Role Analysis

Step 3: Role Functionality Understanding


Intelligence Gathering Workflow

Systematic Tomcat Assessment

Phase 1: Discovery & Fingerprinting

Phase 2: Administrative Interface Assessment

Phase 3: Application Analysis

Phase 4: Vulnerability Research


Enterprise Deployment Patterns

Internal Network Reconnaissance

Multi-Instance Discovery

Load Balancer Detection

Development vs Production Discrimination

Environment Identification


Security Assessment Priorities

High-Value Target Identification

EyeWitness Integration

Risk Prioritization


Next Steps

After Tomcat enumeration, proceed to:

  1. Tomcat Attacks & Exploitation - WAR file uploads and manager abuse

  2. Java Application Securityarrow-up-right - Servlet and JSP vulnerabilities

  3. Jenkins Discoveryarrow-up-right - CI/CD infrastructure enumeration

πŸ’‘ Key Takeaway: Tomcat enumeration focuses on administrative interface discovery, version identification, and configuration analysis. Enterprise environments frequently contain multiple Tomcat instances with weak default credentials, making systematic enumeration crucial for identifying high-value attack vectors and internal network footholds.

Last updated