If we find a JBoss AS instance on a machine and we need to perform a vulnerability assessment, we can always use Metasploit for this. Metasploit has a module for this called auxiliary/scanner/http/jboss_vulnscan, which we can use to perform vulnerability scanning on JBoss AS. The module checks for a few vulnerabilities, such as authentication bypass, a default password, and accessible JMX-console functions. The following are the steps we can observe to carry out a vulnerability assessment on JBoss AS:
- To use jboss_vulnscan, we type the following command in msfconsole:
use auxiliary/scanner/http/jboss_vulnscan
show options
The following screenshot shows the output of the preceding command:
![](https://static.packt-cdn.com/products/9781789953527/graphics/assets/3060a4be-251b-4e9c-b921-a1c82423c429.png)
- We set the required options, as shown:
![](https://static.packt-cdn.com/products/9781789953527/graphics/assets/2d670cc4-6790-4484-bd47-c62f1828b7b6.png)
- Once we run the scanner, it will check against various vulnerabilities and report which vulnerabilities...