From 10d8bebe73d177da5fffbc661635128b5be9cd67 Mon Sep 17 00:00:00 2001 From: Tod Beardsley Date: Wed, 29 May 2013 12:35:57 -0500 Subject: [PATCH] Start with a random username to test 401 codes SeeRM #7991 While this fixes the specific case of tomcat_mgr_login, it doesn't address the general case where modules are attempting to test code 401 responses in order to determine if bruteforcing should continue. --- modules/auxiliary/scanner/http/tomcat_mgr_login.rb | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/modules/auxiliary/scanner/http/tomcat_mgr_login.rb b/modules/auxiliary/scanner/http/tomcat_mgr_login.rb index a3581d16b0..26d658f04c 100644 --- a/modules/auxiliary/scanner/http/tomcat_mgr_login.rb +++ b/modules/auxiliary/scanner/http/tomcat_mgr_login.rb @@ -75,7 +75,8 @@ class Metasploit3 < Msf::Auxiliary uri = normalize_uri(datastore['URI']) res = send_request_cgi({ 'uri' => uri, - 'method' => 'GET' + 'method' => 'GET', + 'username' => Rex::Text.rand_text_alpha(8) }, 25) http_fingerprint({ :response => res }) rescue ::Rex::ConnectionError => e