Now that we have a clear understanding of JBoss's reconnaissance and vulnerability scanning capabilities, let's learn about JBoss exploitation. A few basic methods that we can use to exploit JBoss are as follows:
- JBoss exploitation via the administration console (admin-console)
- JBoss exploitation via the JMX console using the MainDeployer service
- JBoss exploitation via the JMX console using the MainDeployer service (the Metasploit version)
- JBoss exploitation via the JMX console using the BSHDeployer service
- JBoss exploitation via the JMX console using the BSHDeployer service (the Metasploit version)
- JBoss exploitation via the web console using a Java applet
- JBoss exploitation via the web console using the Invoker method
- JBoss exploitation via the web console using third-party tools
Let's go through each of these methods for exploitation.
...