-
Notifications
You must be signed in to change notification settings - Fork 2.2k
Module: Jboss 6.0.0M1 JMX Deploy Exploit
bcoles edited this page Jan 24, 2022
·
2 revisions
-
Objective: Deploy a JSP reverse or bind shell (Metasploit one) using the JMX exposed deploymentFileRepository MBean of JBoss. The first request made is a HEAD one to bypass auth and deploy the malicious JSP, the second request is a GET one that triggers the reverse connection to the specified MSF listener.
Remember to run the MSF multi/handler listener with java/jsp_shell_reverse_tcp as payload, in case you are using the reverse payload. -
Authors: antisnatchor, l33tb0y
-
Browsers: All
- Configuration
- Interface
- Information Gathering
- Social Engineering
- Network Discovery
- Metasploit
- Tunneling
- XSS Rays
- Persistence
- Creating a Module
- Geolocation
- Using-BeEF-With-NGROK