8009 - Pentesting Apache JServ Protocol (AJP)
Last updated
Last updated
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
Join HackenProof Discord server to communicate with experienced hackers and bug bounty hunters!
Hacking Insights Engage with content that delves into the thrill and challenges of hacking
Real-Time Hack News Keep up-to-date with fast-paced hacking world through real-time news and insights
Latest Announcements Stay informed with the newest bug bounties launching and crucial platform updates
Join us on Discord and start collaborating with top hackers today!
From https://diablohorn.com/2011/10/19/8009-the-forgotten-tomcat-port/
AJP ni itifaki ya waya. Ni toleo lililoboreshwa la itifaki ya HTTP ili kuruhusu seva ya wavuti huru kama Apache kuzungumza na Tomcat. Kihistoria, Apache imekuwa haraka zaidi kuliko Tomcat katika kuhudumia maudhui ya statiki. Wazo ni kumruhusu Apache kuhudumia maudhui ya statiki inapowezekana, lakini kupeleka ombi kwa Tomcat kwa maudhui yanayohusiana na Tomcat.
Pia ni ya kuvutia:
Itifaki ya ajp13 inaelekezwa kwenye pakiti. Muundo wa binary ulionekana kuchaguliwa badala ya maandiko rahisi yanayosomwa kwa sababu za utendaji. Seva ya wavuti inawasiliana na kontena la servlet kupitia muunganisho wa TCP. Ili kupunguza mchakato wa gharama kubwa wa uundaji wa socket, seva ya wavuti itajaribu kudumisha muunganisho wa TCP wa kudumu kwa kontena la servlet, na kutumia muunganisho mmoja kwa mizunguko kadhaa ya ombi/jibu.
Default port: 8009
Hii ni LFI vuln ambayo inaruhusu kupata baadhi ya faili kama WEB-INF/web.xml
ambayo ina taarifa za kuingia. Hii ni exploit ya kutumia udhaifu huo na bandari za AJP zilizofichuliwa zinaweza kuwa hatarini.
Toleo zilizorekebishwa ziko kwenye au juu ya 9.0.31, 8.5.51, na 7.0.100.
Inawezekana kuwasiliana na bandari ya AJP proxy iliyo wazi (8009 TCP) kwa kutumia moduli ya Nginx ajp_module
ya apache na kufikia Tomat Manager kutoka bandari hii ambayo inaweza hatimaye kusababisha RCE katika seva iliyo hatarini.
Anza kupakua Nginx kutoka https://nginx.org/en/download.html na kisha uunde na moduli ya ajp:
Kisha, toa maoni kuhusu server
block na ongeza yafuatayo katika http
block katika /etc/nginx/conf/nginx.conf
.
Hatimaye, anzisha nginx (sudo nginx
) na hakikisha inafanya kazi kwa kufikia http://127.0.0.1
Replace TARGET-IP
in nginx.conf
na AJP IP kisha jenga na endesha
Ni possible pia kutumia Apache AJP proxy kufikia bandari hiyo badala ya Nginx.
Join HackenProof Discord server to communicate with experienced hackers and bug bounty hunters!
Hacking Insights Engage with content that delves into the thrill and challenges of hacking
Real-Time Hack News Keep up-to-date with fast-paced hacking world through real-time news and insights
Latest Announcements Stay informed with the newest bug bounties launching and crucial platform updates
Join us on Discord and start collaborating with top hackers today!
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)