JBOSS

Tip

AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:HackTricks Training AWS Red Team Expert (ARTE)
GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training GCP Red Team Expert (GRTE) Azure ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks ์ง€์›ํ•˜๊ธฐ

Enumeration and Exploitation Techniques

์›น ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์˜ ๋ณด์•ˆ์„ ํ‰๊ฐ€ํ•  ๋•Œ, /web-console/ServerInfo.jsp ๋ฐ _/status?full=true_์™€ ๊ฐ™์€ ํŠน์ • ๊ฒฝ๋กœ๋Š” ์„œ๋ฒ„ ์„ธ๋ถ€์ •๋ณด๋ฅผ ๋“œ๋Ÿฌ๋‚ด๋Š” ๋ฐ ์ค‘์š”ํ•ฉ๋‹ˆ๋‹ค. JBoss ์„œ๋ฒ„์˜ ๊ฒฝ์šฐ, /admin-console, /jmx-console, /management, ๋ฐ _/web-console_๊ณผ ๊ฐ™์€ ๊ฒฝ๋กœ๊ฐ€ ์ค‘์š”ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์ด๋Ÿฌํ•œ ๊ฒฝ๋กœ๋Š” ์ข…์ข… ๊ธฐ๋ณธ ์ž๊ฒฉ ์ฆ๋ช…์ด admin/admin์œผ๋กœ ์„ค์ •๋œ ๊ด€๋ฆฌ ์„œ๋ธ”๋ฆฟ์— ๋Œ€ํ•œ ์ ‘๊ทผ์„ ํ—ˆ์šฉํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์ด ์ ‘๊ทผ์€ ํŠน์ • ์„œ๋ธ”๋ฆฟ์„ ํ†ตํ•ด MBeans์™€์˜ ์ƒํ˜ธ์ž‘์šฉ์„ ์šฉ์ดํ•˜๊ฒŒ ํ•ฉ๋‹ˆ๋‹ค:

  • JBoss ๋ฒ„์ „ 6 ๋ฐ 7์˜ ๊ฒฝ์šฐ, /web-console/Invoker๊ฐ€ ์‚ฌ์šฉ๋ฉ๋‹ˆ๋‹ค.
  • JBoss 5 ๋ฐ ์ด์ „ ๋ฒ„์ „์—์„œ๋Š” /invoker/JMXInvokerServlet ๋ฐ /invoker/EJBInvokerServlet์ด ์ œ๊ณต๋ฉ๋‹ˆ๋‹ค.

clusterd์™€ ๊ฐ™์€ ๋„๊ตฌ๋Š” https://github.com/hatRiot/clusterd์—์„œ ์‚ฌ์šฉํ•  ์ˆ˜ ์žˆ์œผ๋ฉฐ, Metasploit ๋ชจ๋“ˆ auxiliary/scanner/http/jboss_vulnscan์€ JBOSS ์„œ๋น„์Šค์˜ ์ทจ์•ฝ์ ์„ ์—ด๊ฑฐํ•˜๊ณ  ์ž ์žฌ์ ์œผ๋กœ ์•…์šฉํ•˜๋Š” ๋ฐ ์‚ฌ์šฉํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

Exploitation Resources

์ทจ์•ฝ์ ์„ ์•…์šฉํ•˜๊ธฐ ์œ„ํ•ด JexBoss์™€ ๊ฐ™์€ ๋ฆฌ์†Œ์Šค๋Š” ์œ ์šฉํ•œ ๋„๊ตฌ๋ฅผ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค.

Finding Vulnerable Targets

Google Dorking์€ inurl:status EJInvokerServlet์™€ ๊ฐ™์€ ์ฟผ๋ฆฌ๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ ์ทจ์•ฝํ•œ ์„œ๋ฒ„๋ฅผ ์‹๋ณ„ํ•˜๋Š” ๋ฐ ๋„์›€์„ ์ค„ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

Tip

AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:HackTricks Training AWS Red Team Expert (ARTE)
GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training GCP Red Team Expert (GRTE) Azure ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks ์ง€์›ํ•˜๊ธฐ