- 1、本文档被系统程序自动判定探测到侵权嫌疑,本站暂时做下架处理。
- 2、如果您确认为侵权,可联系本站左侧在线QQ客服请求删除。我们会保证在24小时内做出处理,应急电话:400-050-0827。
- 3、此文档由网友上传,因疑似侵权的原因,本站不提供该文档下载,只提供部分内容试读。如果您是出版社/作者,看到后可认领文档,您也可以联系本站进行批量认领。
查看更多
Hacking / Hacking Exposed Web Applications / Scambray / 174064-3
92
Hacking Exposed Web Applications
MANUAL EXPLOITATION
We showed you the easy way first because that’s probably the way the majority of attacks
are performed (since most malicious hacking follows the path of least resistance).
However, more sophisticated attackers may expend substantially more time and effort to
bring a web server down, so we’ll take some time in this section to illustrate some of the
finer points of a handcrafted attack. The key things to notice in this example are the
increased level of time and skill brought to bear on identifying and then exploiting the
vulnerability, as opposed to the Metasploit example. Take-home point: just because you
run a web platform that doesn’t rate a ton of attention from projects like Metasploit
doesn’t mean you’re any less vulnerable!
Oracle WebLogic Node Manager Remote Command Execution
Popularity: 1
Simplicity: 5
Impact: 9
Risk Rating: 5
In May 2010, a vulnerability was discovered in the WebLogic Node Manager service
that ultimately allowed the execution of arbitrary commands on a WebLogic server.
WebLogic is a popular J2EE platform from Oracle.
The WebLogic Node Manager is an administrative service for starting and stopping
WebLogic server instances. It uses a straightforward text-based network protocol to
communicate with clients and, by default, encapsulates traffic using SSL on port 5556/
TCP. Due to the protocol’s st
文档评论(0)