Hacking Weblogic
Hacking Weblogic
Hacking Weblogic
and current set of measures taken to prevent these threats, alongside with practical
recommendation how to increase the security of the website.
Http://www.sysmox.com
Page: 1
Table of Contents:
1 Introduction …………………….……………2
2 Web logic …………………………………….2
3 Default installation…………………………...3
3.1 The web application………………………..4
3.2 deploy it ……………………………………5
3.3 Backdooring the weblogic………………….6
4 Securing……………………………...….….7
1. Introduction:
Brief paper about how attackers can use the default password to hack the weblogic.
1.2 Weblogic :
Owned by Oracle Corporation, Oracle WebLogic consists of a Java EE platform product-
family that includes:
Page: 2
2. Default installation :
A moderately high number of weblogic server keep the default password during the
instalation . it is quite easy for an hacker to enter to the weblogic console and gain access to
privat and sensitive information and data center ,This attack can be used for hackers in
diferent ways .
Most WebLogic Administration Console start witht the default password:
Username : weblogic and the default Password is weblogic. Attacker need just to browse
bLogic Server is http://hostname:port, where hostname is the name of the server where
WebLogic is installed and port is the WebLogic port number (by default, 7001).
Http://localhost:7001/console
Hackers can use different way to get list of web server running weblogics .
Page: 3
Here are list of default passwords:
http://cirt.net/passwords?criteria=weblogic
Page: 4
In Web Application Modules :
A Web application on WebLogic Server includes the following files:
Page: 5
It is necessary to create a WAR file with WEB-INF a JSP to execute system commands. The
WAR file should be deployed and and run commands using the cmdshell.jsp. These
commands will be executed with the privileges of the weblogic server.
Attackers can use different scanner to get weblogic server as google dork
Page: 6
4 .Securing the weblogic:
http://download.oracle.com/docs/cd/E12890_01/ales/docs32/integrateappenviron/configWLS.
html#wp1099454
The main mission of sysmox is to conduct researches of different application and system
vulnerabilities. The result of this work is then used by the experts of the sysmox Security
audit department for assessing the security level of information systems with the use of active
audit methods and also while carrying out penetration tests .
Http://www.sysmox.com
Page: 7