hacktricks/network-services-pentesting/pentesting-web/jboss.md
2024-12-12 11:39:29 +01:00

4.2 KiB

JBOSS

{% hint style="success" %} Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}

Bug bounty tip: sign up for Intigriti, a premium bug bounty platform created by hackers, for hackers! Join us at https://go.intigriti.com/hacktricks today, and start earning bounties up to $100,000!

{% embed url="https://go.intigriti.com/hacktricks" %}

Enumeration and Exploitation Techniques

When assessing the security of web applications, certain paths like /web-console/ServerInfo.jsp and /status?full=true are key for revealing server details. For JBoss servers, paths such as /admin-console, /jmx-console, /management, and /web-console can be crucial. These paths might allow access to management servlets with default credentials often set to admin/admin. This access facilitates interaction with MBeans through specific servlets:

  • For JBoss versions 6 and 7, /web-console/Invoker is used.
  • In JBoss 5 and earlier versions, /invoker/JMXInvokerServlet and /invoker/EJBInvokerServlet are available.

Tools like clusterd, available at https://github.com/hatRiot/clusterd, and the Metasploit module auxiliary/scanner/http/jboss_vulnscan can be used for enumeration and potential exploitation of vulnerabilities in JBOSS services.

Exploitation Resources

To exploit vulnerabilities, resources such as JexBoss provide valuable tools.

Finding Vulnerable Targets

Google Dorking can aid in identifying vulnerable servers with a query like: inurl:status EJInvokerServlet

Bug bounty tip: sign up for Intigriti, a premium bug bounty platform created by hackers, for hackers! Join us at https://go.intigriti.com/hacktricks today, and start earning bounties up to $100,000!

{% embed url="https://go.intigriti.com/hacktricks" %}

{% hint style="success" %} Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}