You are here: hacking technology > invades the examination > Content
Hot Articles
Recommend Articles
New Articles
Tomcat invasion examination guard (chart)
  Add date: 09/16/2008   Publishing date: 09/16/2008   Hits: 117
Tomcat is one section opens the source the Web server system, the stand system expenses is small with its build's Web, the extension is good, and support load stabilization and mail service and so on, therefore quite gains stationmasters' popularity. What is worth mentioning is Tomcat the superiority is obvious in the Linux system platform, many users use it to build the Web stand. Recently, about the Tomcat invasion unusual fire, had many Web stand even server to fall to the enemy. What is discomforting, implements the Tomcat invasion technology threshold to be quite low, therefore harms enormously. The following author reveals the invasion process, so that stationmaster can know oneself and the other side, takes the corresponding measure, reinforces the stand security.
  First, Tomcat the invasion reveals
  1st, scanning
  Is the same with nearly all invasions, the aggressor is also starts to the Tomcat invasion from the scanning. Now in the network braves in view of the Tomcat scanning tool like mushroom growth, the common user is extremely easy to obtain. And some tools may carry on the key word search scanning, the aggressor inputs the corresponding key word to be possible to implement to some kind of Tomcat stand carries on the scanning invasion.
  The scanning principle is simple, because the Tomcat default is provides the Web service outward through 8080 ports. These tools have opened 8080 port's main engines on the direct scanning network, and its may filter opens 8080 port's Web firewalls, reduces the attack scope. Could obtain not only using the scanning tool aggressor has opened 8080 port's Tomcat server's IP address, but might also scan guesses Xie automatically Ruo the password. (Figure 1)
  

  2nd, backstage
  After having IP which and the weak password the above scanning obtains, the aggressor may register the backstage through the default admin user. The Tomcat default backstage is http:// server IP:8080/manager/html, inputs this URL address in the browser address fence, springs registers the dialog box, input default user admin and the weak password then registers the backstage. (Figure 2)
                                             


Prev:[splendid] invades examination system FAQ (entire) Next:How to examine the VMware system

Comment:

Category: Home > invades the examination