Skip to main content

No project description provided

Project description

A python script to scan for Apache Tomcat server vulnerabilities.
PyPI GitHub release (latest by date) Python pip build YouTube Channel Subscribers

Features

  • Multithreaded workers to search for Apache tomcat servers.
  • Multiple target source possible:
    • Retrieving list of computers from a Windows domain through an LDAP query to use them as a list of targets.
    • Reading targets line by line from a file.
    • Reading individual targets (IP/DNS/CIDR) from -tt/--target option.
  • Custom list of ports to test.
  • Tests for /manager/html access and default credentials.
  • List the CVEs of each version with the --list-cves option

Installation

You can now install it from pypi (latest version is PyPI) with this command:

sudo python3 -m pip install apachetomcatscanner

Usage

$ ./ApacheTomcatScanner.py -h
Apache Tomcat Scanner v2.1 - by @podalirius_

usage: ApacheTomcatScanner.py [-h] [-v] [-C] [-T THREADS] [-PI PROXY_IP] [-PP PROXY_PORT] [-rt REQUEST_TIMEOUT] [-tf TARGETS_FILE] [-tt TARGET] [-tp TARGET_PORTS] [-ad AUTH_DOMAIN] [-ai AUTH_DC_IP] [-au AUTH_USER] [-ap AUTH_PASSWORD]
                              [-ah AUTH_HASH]

A python script to scan for Apache Tomcat server vulnerabilities.

optional arguments:
  -h, --help            show this help message and exit
  -v, --verbose         Verbose mode. (default: False)
  -C, --list-cves       List CVE ids affecting each version found. (default: False)
  -T THREADS, --threads THREADS
                        Number of threads (default: 5)

  -PI PROXY_IP, --proxy-ip PROXY_IP
                        Proxy IP.
  -PP PROXY_PORT, --proxy-port PROXY_PORT
                        Proxy port
  -rt REQUEST_TIMEOUT, --request-timeout REQUEST_TIMEOUT

  -tf TARGETS_FILE, --targets-file TARGETS_FILE
  -tt TARGET, --target TARGET
                        Target IP, FQDN or CIDR
  -tp TARGET_PORTS, --target-ports TARGET_PORTS
                        Target ports to scan top search for Apache Tomcat servers.
  -ad AUTH_DOMAIN, --auth-domain AUTH_DOMAIN
  -ai AUTH_DC_IP, --auth-dc-ip AUTH_DC_IP
  -au AUTH_USER, --auth-user AUTH_USER
  -ap AUTH_PASSWORD, --auth-password AUTH_PASSWORD
  -ah AUTH_HASH, --auth-hash AUTH_HASH

Example

You can also list the CVEs of each version with the --list-cves option:

Contributing

Pull requests are welcome. Feel free to open an issue if you want to add other features.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

apachetomcatscanner-2.3.1.tar.gz (579.8 kB view details)

Uploaded Source

Built Distribution

apachetomcatscanner-2.3.1-py3-none-any.whl (296.4 kB view details)

Uploaded Python 3

File details

Details for the file apachetomcatscanner-2.3.1.tar.gz.

File metadata

  • Download URL: apachetomcatscanner-2.3.1.tar.gz
  • Upload date:
  • Size: 579.8 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.1 CPython/3.8.10

File hashes

Hashes for apachetomcatscanner-2.3.1.tar.gz
Algorithm Hash digest
SHA256 3f63e001e3f0204290dd617b4f726a0fccc41a4009620be935698aa15abecd96
MD5 6e07b9fc41b692a1ab99d4adb9d90b53
BLAKE2b-256 246be55f5413387df5737f2208ad6641c11f094d085640920ec0f70b328de13d

See more details on using hashes here.

File details

Details for the file apachetomcatscanner-2.3.1-py3-none-any.whl.

File metadata

File hashes

Hashes for apachetomcatscanner-2.3.1-py3-none-any.whl
Algorithm Hash digest
SHA256 51536ad19bcc80aa4a076b5e52e72d0944512c1bcd43ac0bec4b387cd31775a4
MD5 0a1921e3bd31f894ebbcaca89549bed2
BLAKE2b-256 be63b51dbe35be2c632309188225662281587db7a20cb4eb5b02190856871375

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page