Hacker News new | past | comments | ask | show | jobs | submit login
Decrypting WebLogic Passwords (netspi.com)
16 points by mortenlarsen on April 10, 2015 | hide | past | favorite | 6 comments



Truth is, the whole Fusion Middleware stack is... not very hard to compromise, even without resorting to password-cracking. Product-specific knowledge is often enough to retrieve plaintext credentials from a number of products. The whole Oracle ecosystem is like that -- SQLDeveloper's passwords can also be retrieved very easily.

The unspeakable truth is, in most enterprise companies, the ability to retrieve a lost password (when the original employee is on holiday/was fired/stepped under a bus) is more valued than the ability to secure it.

We always talk about security theatre like it only happens at airports, but I see lots of it in regular companies as well.


>We always talk about security theatre like it only happens at airports, but I see lots of it in regular companies as well.

Excel spreadsheets, shared across the network, that contain all important company passwords - I've seen it at more than one company.


You could already do this without coding anything.

http://recover-weblogic-password.appspot.com/

Here's the same thing for WebSphere:

http://www.poweredbywebsphere.com/decoder.html


I'm against uploading any type of sensitive information to an unknown website.


This kind of thing isn't exactly unique to WebLogic.

Privileged filesystem access generally means doom for your application's security layer, as you'll be able to springboard into databases or other systems from there.

If you have access to a salt file, you can generate hashes from that. If you have access to an encryption key, you can decrypt encrypted strings. Plus, so many configurations just use plaintext passwords.

The cool thing here is he found a way to decrypt these without having to run a WebLogic script, which has always been a minor pain.


It was known that Weblogic was storing encrypted passwords, but publishing just how easy it is to decrypt them and the fact that they're using the same key across all Weblogic installs is the real concern.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: