WebLogic Console password loss affects system update version
When the middleware is guaranteed to function properly, decrypt the encrypted password and log in to the console
The premise is that the middleware is located on the server permissions, ordinary users can
Required Files:
SerializedSystemIni.dat This is the WebLogic encryption key, only one, if not found can use the Find command to locate
My path is:/home/anker/domains/anker_domain/security/serializedsystemini.dat
setwlsenv.sh Configuring environment variables with
My path:/home/anker/oracle/middleware/wlserver_10.3/server/bin/setwlsenv.sh
boot.properties The file is a password file, and the password is encrypted after the WebLogic startup is successful.
My path:/home/anker/domains/pass_domain/servers/adminserver/security/boot.properties
Decryption process:
Create a new directory and copy the SerializedSystemIni.dat file to this directory
such as:/home/anker/password/serializedsystemini.dat
Create a new Java file under this folder, Decrypt.java, the name must be the same as the class name of the content.
import weblogic.security.internal.*;import weblogic.security.internal.encryption.*;import Java.io.printstream;public class decrypt { static encryptionservice es = null; static ClearOrEncryptedService ces = Null; public static void main (String[] args) { String s = null; if (args.length == 0) { s = serverauthenticate.promptvalue ("password: ", false); } else if (args.length == 1) { s = args[0]; } else { system.err.println ("Usage: java decrypt [ password ] "); } es = serializedsystemini.getexistingencryptionservice (); if (es == null) { system.err.println ("Unable to initialize encryption service "); return; } ces = new Clearorencryptedservice (es); if (s != null) { system.out.println ("\nDecrypted password is: "&nbsP;+ ces.decrypt (s)); } }}
3. Execute setwlsenv.sh script, after execution will come out a long list of environment variables, namely classpath and path
The results of the execution are as follows (only the parts listed):
Classpath=/home/anker/oracle/middleware/patch_wls1036/profiles/default/sys_manifest_classpath/weblogic_ patch.jar:/home/anker/oracle/middleware/patch_ocp371
path=/home/anker/oracle/middleware/wlserver_10.3/server/bin:/home/anker/oracle/middleware/modules/ Org.apache.ant_1.7.1/bin:
Execute the Export command to configure a temporary environment variable (valid only under that window, and the shutdown is invalidated)
$ Export classpath=/home/pass/oracle/middleware/patch_wls1036/profiles/default/sys_manifest_ Classpath/weblogic_patch.jar:/home/pass/oracle/middleware/patch_ocp371/profile
$ Export path=/home/anker/oracle/middleware/wlserver_10.3/server/bin:/home/anker/oracle/middleware/ Modules/org.apache.ant_1.7.1/bin:
Confirm success: Execute echo $CLASSPATH
The content displayed is the same as when the script was executed successfully.
In the 4.weblogic console password configuration file, obtain the encrypted password:
Cat Boot.properties
#Thu 17:14:36 CST 2017
password={aes}dhmf9dv4wo3al87a3sedevpdoitg6n21hllbrka1+ck\=
username={aes}uowgoxmpa0isba68wc6vsnp6atbszklr4xqypbcocuo\=
To the directory where the Decrypt.java was previously executed Javac Decrypt.java
Then execute the Java Decrypt encryption after the password, such as
Java Decrypt {aes}dhmf9dv4wo3al87a3sedevpdoitg6n21hllbrka1+ck\=
After execution, the decrypted result is displayed, and the decrypted result is as follows
Decrypted Password is:welcome1
Once you know your password, you can log in to console.
This article is from the "Learning Path" blog, please be sure to keep this source http://rhelanker.blog.51cto.com/12834161/1964330
Linux-weblogic 10.3.6 Console Password decryption process