In addition, because of its relatively simple function requires us to further setup. This machine will talk about the deployment of a Tomcat based Web server from both security and functionality, and I hope it helps.
Environment description
Os:windows Server 2003
ip:192.168.1.12
tomcat:6.0.18
1. Safety Test
(1). Login Backstage
Deploy Tomcat on Windows Server 2003, and everything remains the default. Then log on to the Tomcat background, whose default background address is:
http://192.168.1.12:8080/manager/html。 Enter the address in the browser, return to the Login dialog box, enter the default username admin, the default password is blank, successfully login backstage. (Figure 1)
(2). Get Webshell
There is a war file to deploy module in Tomcat's background that allows you to upload war files. Tomcat can parse the war file to extract it and generate Web files. We package a JSP-formatted Webshell with WinRAR and then rename the suffix to war (in this case Gslw.war), so that a war package is generated. Finally upload it to the server, you can see in the background of Tomcat more than a directory named/GSLW, click on the directory to open the directory JSP Trojan ran, so that the acquisition of a Webshell. (Figure 2)
(3). Test operation
Create an administrator
The Tomcat service is run by default with system privileges, so the JSP Trojan inherits its permissions and can perform almost all operations on the Web server. such as starting the service, deleting/creating/modifying files, creating users. Let's demonstrate by creating an administrator user. Run the "command line" module of the JSP Trojan, enter the command net user test Test168/add and net localgroup Administrators Test/add, and create a test user with administrator privileges. The password is test168. (Figure 3)
Telnet
We can also penetrate further, such as by "Remote Desktop" to log on to the Web server. Enter command Netstat-ano to see that the server's port 3389 is turned off. We can use Webshell to upload a tool to use it to open the Web server's Remote Desktop. Finally, we can successfully login to the system, so that the entire web fell. (Figure 4)
current 1/3 page
1 23 Next read the full text