Book Image

BackTrack 5 Cookbook

By : Willie L. Pritchett, David De Smet
Book Image

BackTrack 5 Cookbook

By: Willie L. Pritchett, David De Smet

Overview of this book

<p>BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. BackTrack is a distribution based on the Debian GNU/Linux distribution aimed at digital forensics and penetration testing use. It is named after backtracking, a search algorithm.<br /><br />"BackTrack 5 Cookbook" provides you with practical recipes featuring many popular tools that cover the basics of a penetration test: information gathering, vulnerability identification, exploitation, priviledge escalation, and covering your tracks.<br /><br />The book begins by covering the installation of BackTrack 5 and setting up a virtual environment to perform your tests.<br /><br />We then dip into recipes involving the basic principles of a penetration test such as information gathering, vulnerability identification, and exploitation. You will further learn about privilege escalation, radio network analysis, Voice over IP, Password cracking, and BackTrack forensics.<br /><br />"BackTrack 5 Cookbook" will serve as an excellent source of information for the security professional and novice alike.</p>
Table of Contents (17 chapters)
BackTrack 5 Cookbook
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface
Index

Metasploitable Tomcat


In this recipe, we will explore how to use Metasploit to attack a Tomcat server using the Tomcat Manager Login module. Tomcat, or Apache Tomcat, is an open source web server and servlet container used to run Java Servlets and JavaServer Pages (JSP). The Tomcat server is written in pure Java. We will use Metasploit in order to brute force a Tomcat login.

Getting ready

The following requirements need to be fulfilled:

  • A connection to the internal network is required to complete this recipe

  • Metasploitable running in our hacking lab

  • Word list to perform a dictionary attack

How to do it...

Let's begin the recipe by opening a terminal window:

  1. Open a command prompt.

  2. Launch the MSFCONSOLE:

    msfconsole
    
  3. Search for all available Tomcat modules:

    search tomcat
    
  4. Use the Tomcat Application Manager Login Utility:

    use auxiliary/scanner/http/tomcat_mgr_login
    
  5. Show the available options of the module:

    show options
    

    Note

    Notice we have a lot of items that are set to yes and are required. We will utilize...