BLOG OF H7T_2002

Bạn có muốn phản ứng với tin nhắn này? Vui lòng đăng ký diễn đàn trong một vài cú nhấp chuột hoặc đăng nhập để tiếp tục.
BLOG OF H7T_2002

Trang cá nhân của H7T_2002++


    Tomcat Apache Information Dumps - Hack the Garbage

    avatar
    h7t_2002
    --[DEVELOPER]--
    --[DEVELOPER]--


    Tổng số bài gửi : 67
    Join date : 01/06/2009
    Age : 33
    Đến từ : /dev/null

    Tomcat Apache Information Dumps - Hack the Garbage Empty Tomcat Apache Information Dumps - Hack the Garbage

    Bài gửi by h7t_2002 Mon Jul 12, 2010 7:16 am

    AKS aka 0kn0ck , CERA
    Note : For Education Purposes Only !.

    View:
    .

    The web is a platform for launching number of attacks in different environment. It is not so easy to directly trigger the pattern of insecurity and exploit the dynamic entities. The web itself holds tremendous information. This information should be managed and tackled in a right way. Again the administration is a big problem. Well it is. While pen testing Apache tomcat it is undertaken that the security is implemented in a worst way. Most of the time weak passwords and poorly generated modules and misconfigurations lead to control.

    Note: 50 % of Apache Tomcat servers can be hacked in easy manner if security is slithered.

    The randmization check on web produces understated dump of tomcat-users.xml file. It some time look strange and insecure to prove the fact that administration leads to insecurity. One other reason can be the administrator do not understand the actual parameter of security when particular security object is concerned. This time it is Apache Tomcat. Its always been a threat as username and password is present in the XML file. One more step is its present in clear text. We will look into two casesas related to this factor.

    1. http://www.opensource.apache.com

    2. http://www.opensource.adobe.com


    So lets see:-

    Check 1

    tomcat-users
    role rolename="Editeerder"/
    role rolename="Consulterend Gebruiker"/
    role rolename="Beheerder"/
    role rolename="Goedkeurder"/
    role rolename="tomcat"/
    user username="gast" password="gast" roles="Consulterend Gebruiker"/
    user username="editeerder" password="editeerder" roles="Consulterend Gebruiker,Editeerder"/
    user username="tomcat" password="tomcat" roles="tomcat"/
    user username="gegis" password="gegispass" roles="Consulterend Gebruiker,Editeerder,Goedkeurder,Beheerder"/
    user username="guest" password="guest" roles="Consulterend Gebruiker"/
    /tomcat-users

    Check 2

    ?xml version='1.0' encoding='utf-8'?
    tomcat-users
    role rolename="demo.owner"/
    role rolename="tomcat"/
    role rolename="role1"/
    role rolename="manager"/
    role rolename="demo.user"/
    role rolename="demo.alerts"/
    role rolename="demo.contentadmin"/
    role rolename="admin"/
    role rolename="demo.admin"/
    user username="caluser2" password="uwcal" roles="demo.user"/
    user username="calcontent" password="uwcal" roles="demo.contentadmin"/
    user username="caluser" password="uwcal" roles="demo.user"/
    user username="caluser1" password="uwcal" roles="demo.user"/
    user username="tomcat" password="tomcat" roles="tomcat"/
    user username="caladmin" password="uwcal" roles="demo.admin"/
    user username="calowner" password="uwcal" roles="demo.owner"/
    user username="calowner2" password="uwcal" roles="demo.owner"/
    user username="calowner3" password="uwcal" roles="demo.owner"/
    user username="role1" password="tomcat" roles="role1"/
    user username="both" password="tomcat" roles="tomcat,role1"/
    user username="caluser3" password="uwcal" roles="demo.user"/
    user username="manager" password="VuRyser2" roles="admin,manager"/
    /tomcat-users

    Check 3

    1 ?xml version='1.0' encoding='utf-8'?
    2 tomcat-users
    3 role rolename="tomcat"/
    4 role rolename="role1"/
    5 user username="tomcat" password="tomcat" roles="tomcat"/
    6 user username="role1" password="tomcat" roles="role1"/
    7 user username="both" password="tomcat" roles="tomcat,role1"/
    8 /tomcat-users

    Check 4

    tomcat-users
    role rolename="tomcat"/
    role rolename="role1"/
    role rolename="manager"/
    role rolename="admin"/
    user username="tomcat" password="tomcat" roles="tomcat"/
    user username="role1" password="tomcat" roles="role1"/
    user username="both" password="tomcat" roles="tomcat,role1"/
    user username="admin" password="admin" roles="admin,manager"/
    /tomcat-users

    Check 5

    tomcat-users
    role rolename="provider"/
    role rolename="manager"/
    role rolename="admin"/
    user username="root" password="" fullName="sys admin" roles="admin,manager,provider"/
    /tomcat-users

    ?xml version='1.0' encoding='utf-8'?
    tomcat-users
    role rolename="tomcat"/
    role rolename="role1"/
    user username="tomcat" password="tomcat" roles="tomcat"/
    user username="role1" password="tomcat" roles="role1"/
    user username="both" password="tomcat" roles="tomcat,role1"/
    /tomcat-users

    tomcat-users
    user name="tomcat" password="tomcat" roles="tomcat,manager"/
    user name="role1" password="tomcat" roles="role1"/
    user name="both" password="tomcat" roles="tomcat,role1"/
    /tomcat-users


    This is actually the result of incessant dumps that are present on servers. But this really a good deal of fidning relative passwords as such. On next step this information is used for further attacks on the web server itself.

    http://www.opensource.apache.com

    tomcat-users
    role rolename="tomcat"/
    role rolename="role1"/
    role rolename="admin"/
    user username="tomcat" password="tomcat" roles="tomcat"/
    user username="role1" password="tomcat" roles="role1"/
    user username="both" password="tomcat" roles="tomcat,role1"/
    user username="admin" password="apple" roles="admin"/
    /tomcat-users

    http://www.opensource.adobe.com

    ?xml version='1.0' encoding='utf-8'?
    tomcat-users
    !--
    role rolename="tomcat"/
    role rolename="role1"/
    user username="tomcat" password="tomcat" roles="tomcat"/
    user username="both" password="tomcat" roles="tomcat,role1"/
    user username="role1" password="tomcat" roles="role1"/
    --
    /tomcat-users

    So this is what we use to get from garbage dumps. So lets Hack through Web Garbage.

      Hôm nay: Mon May 20, 2024 6:19 am