معرفی شرکت ها


apachetomcatscanner-2.3.5


Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر

توضیحات

-
ویژگی مقدار
سیستم عامل OS Independent
نام فایل apachetomcatscanner-2.3.5
نام apachetomcatscanner
نسخه کتابخانه 2.3.5
نگهدارنده []
ایمیل نگهدارنده []
نویسنده Podalirius
ایمیل نویسنده podalirius@protonmail.com
آدرس صفحه اصلی https://github.com/p0dalirius/ApacheTomcatScanner
آدرس اینترنتی https://pypi.org/project/apachetomcatscanner/
مجوز GPL2
![](./.github/banner.png) <p align="center"> A python script to scan for Apache Tomcat server vulnerabilities. <br> <img alt="PyPI" src="https://img.shields.io/pypi/v/apachetomcatscanner"> <img alt="GitHub release (latest by date)" src="https://img.shields.io/github/v/release/p0dalirius/ApacheTomcatScanner"> <img alt="Python pip build" src="https://github.com/p0dalirius/ApacheTomcatScanner/actions/workflows/python-pip-build.yml/badge.svg"> <a href="https://twitter.com/intent/follow?screen_name=podalirius_" title="Follow"><img src="https://img.shields.io/twitter/follow/podalirius_?label=Podalirius&style=social"></a> <a href="https://www.youtube.com/c/Podalirius_?sub_confirmation=1" title="Subscribe"><img alt="YouTube Channel Subscribers" src="https://img.shields.io/youtube/channel/subscribers/UCF_x5O7CSfr82AfNVTKOv_A?style=social"></a> <br> </p> ## Features - [x] Multithreaded workers to search for Apache tomcat servers. - [x] Multiple target source possible: - [x] Retrieving list of computers from a Windows domain through an LDAP query to use them as a list of targets. - [x] Reading targets line by line from a file. - [x] Reading individual targets (IP/DNS/CIDR) from `-tt/--target` option. - [x] Custom list of ports to test. - [x] Tests for `/manager/html` access and default credentials. - [x] List the CVEs of each version with the `--list-cves` option ## Installation You can now install it from pypi (latest version is <img alt="PyPI" src="https://img.shields.io/pypi/v/apachetomcatscanner">) with this command: ``` sudo python3 -m pip install apachetomcatscanner ``` ## Usage ``` Apache Tomcat Scanner v2.3.4 - by @podalirius_ usage: ApacheTomcatScanner.py [-h] [-v] [--debug] [-C] [-T THREADS] [-s] [--only-http] [--only-https] [--no-check-certificate] [--export-xlsx EXPORT_XLSX] [--export-json EXPORT_JSON] [--export-sqlite EXPORT_SQLITE] [-PI PROXY_IP] [-PP PROXY_PORT] [-rt REQUEST_TIMEOUT] [--tomcat-username TOMCAT_USERNAME] [--tomcat-usernames-file TOMCAT_USERNAMES_FILE] [--tomcat-password TOMCAT_PASSWORD] [--tomcat-passwords-file TOMCAT_PASSWORDS_FILE] [-tf TARGETS_FILE] [-tt TARGET] [-tp TARGET_PORTS] [-ad AUTH_DOMAIN] [-ai AUTH_DC_IP] [-au AUTH_USER] [-ap AUTH_PASSWORD] [-ah AUTH_HASHES] [--ldaps] A python script to scan for Apache Tomcat server vulnerabilities. optional arguments: -h, --help show this help message and exit -v, --verbose Verbose mode. (default: False) --debug Debug mode, for huge verbosity. (default: False) -C, --list-cves List CVE ids affecting each version found. (default: False) -T THREADS, --threads THREADS Number of threads (default: 5) -s, --servers-only If querying ActiveDirectory, only get servers and not all computer objects. (default: False) --only-http Scan only with HTTP scheme. (default: False, scanning with both HTTP and HTTPs) --only-https Scan only with HTTPs scheme. (default: False, scanning with both HTTP and HTTPs) --no-check-certificate Do not check certificate. (default: False) Export results: --export-xlsx EXPORT_XLSX Output XLSX file to store the results in. --export-json EXPORT_JSON Output JSON file to store the results in. --export-sqlite EXPORT_SQLITE Output SQLITE3 file to store the results in. Advanced configuration: -PI PROXY_IP, --proxy-ip PROXY_IP Proxy IP. -PP PROXY_PORT, --proxy-port PROXY_PORT Proxy port -rt REQUEST_TIMEOUT, --request-timeout REQUEST_TIMEOUT Set the timeout of HTTP requests. --tomcat-username TOMCAT_USERNAME Set the timeout of HTTP requests. --tomcat-usernames-file TOMCAT_USERNAMES_FILE Set the timeout of HTTP requests. --tomcat-password TOMCAT_PASSWORD Set the timeout of HTTP requests. --tomcat-passwords-file TOMCAT_PASSWORDS_FILE Set the timeout of HTTP requests. Targets: -tf TARGETS_FILE, --targets-file TARGETS_FILE Path to file containing a line by line list of targets. -tt TARGET, --target TARGET Target IP, FQDN or CIDR -tp TARGET_PORTS, --target-ports TARGET_PORTS Target ports to scan top search for Apache Tomcat servers. -ad AUTH_DOMAIN, --auth-domain AUTH_DOMAIN Windows domain to authenticate to. -ai AUTH_DC_IP, --auth-dc-ip AUTH_DC_IP IP of the domain controller. -au AUTH_USER, --auth-user AUTH_USER Username of the domain account. -ap AUTH_PASSWORD, --auth-password AUTH_PASSWORD Password of the domain account. -ah AUTH_HASHES, --auth-hashes AUTH_HASHES LM:NT hashes to pass the hash for this user. --ldaps Use LDAPS (default: False) ``` ## Example ![](./.github/example.png) You can also list the CVEs of each version with the `--list-cves` option: ![](./.github/example_list_cves.png) ## Contributing Pull requests are welcome. Feel free to open an issue if you want to add other features.


نیازمندی

مقدار نام
- requests
>=1.3.9 sectools
- xlsxwriter


زبان مورد نیاز

مقدار نام
>=3.6 Python


نحوه نصب


نصب پکیج whl apachetomcatscanner-2.3.5:

    pip install apachetomcatscanner-2.3.5.whl


نصب پکیج tar.gz apachetomcatscanner-2.3.5:

    pip install apachetomcatscanner-2.3.5.tar.gz