In this chapter, we learned about the basics of JBoss, and then moved on to studying the file and directory structure. Next, we looked at the enumeration of JBoss, and then we moved on to carrying out vulnerability assessments using the Metasploit framework, after which we got to the exploitation process via the administration console. Finally, we performed exploitation through the web console.
In the next chapter, we will learn about pentesting on Apache Tomcat.