To find weblogic password follow below steps
First go to below location
/opt/app/oracle/middlewarer2/oracle_common/common/bin
**********************************************************************************************
create a file name with decrypt.py
vi decrypt.py
#/bin/python
#=====================================================================
#
# $Id: decrypt.py $
#
# PURPOSE: Script to decrypt any Password or Username
# within a WebLogic Server Domain
#
# PARAMETERS: none
#
# NOTES: none
#
# AUTHOR: Dirk Nachbar, https://dirknachbar.blogspot.com
#
# MODIFIED:
#
#
#=====================================================================
# Import weblogic.security.internal and weblogic.security.internal.encryption
from weblogic.security.internal import *
from weblogic.security.internal.encryption import *
# Provide Domain Home Location
domain = raw_input("Provide Domain Home location: ")
# Get encryption service with above Domain Home Location
encryptService = SerializedSystemIni.getEncryptionService(domain)
clearOrEncryptService = ClearOrEncryptedService(encryptService)
# Provide the encrypted password or username, e.g. from boot.properties
encrypted_pwd = raw_input("Provide encrypted password or username (e.g.: {AES}jNdVLr...): ")
# Clear the encrypted value from escaping characters
cleared_pwd = encrypted_pwd.replace("\\", "")
# Personal security hint :-)
raw_input("Make sure that nobody is staying behind you :-) Press ENTER to see the password ...")
# Decrypt the encrypted password or username
print "Value in cleartext is: " + clearOrEncryptService.decrypt(cleared_pwd)
#END
**********************************************************************************************
You can get the encrypted password and username from below location
cd /opt/app/oracle/middlewarer2/gc_inst/user_projects/domains/GCDomain/servers/EMGC_ADMINSERVER/security
cat boot.properties
#Generated by Configuration Wizard on Sat Oct 20 10:20:22 PDT 2012
username={AES}tFHZTUTQ5xhgS3WQicmnSPgTfFv1xswVwndUaCeb7qk=
password={AES}QZ06i3z6EAoK82eb20n0dZr+xYAxUAk26HtgmOt4Pp0=
**********************************************************************************************
export DOMAIN_HOME=/opt/app/oracle/middlewarer2/gc_inst/user_projects/domains/GCDomain
cd /opt/app/oracle/middlewarer2/oracle_common/common/bin
Make sure decrypt.py has execute permission
./wlst.sh decrypt.py
Provide Domain Home location: /opt/app/oracle/middlewarer2/gc_inst/user_projects/domains/GCDomain
Provide encrypted password or username (e.g.: {AES}jNdVLr...): {AES}tFHZTUTQ5xhgS3WQicmnSPgTfFv1xswVwndUaCeb7qk=
Now you will get password in cleartext
First go to below location
/opt/app/oracle/middlewarer2/oracle_common/common/bin
**********************************************************************************************
create a file name with decrypt.py
vi decrypt.py
#/bin/python
#=====================================================================
#
# $Id: decrypt.py $
#
# PURPOSE: Script to decrypt any Password or Username
# within a WebLogic Server Domain
#
# PARAMETERS: none
#
# NOTES: none
#
# AUTHOR: Dirk Nachbar, https://dirknachbar.blogspot.com
#
# MODIFIED:
#
#
#=====================================================================
# Import weblogic.security.internal and weblogic.security.internal.encryption
from weblogic.security.internal import *
from weblogic.security.internal.encryption import *
# Provide Domain Home Location
domain = raw_input("Provide Domain Home location: ")
# Get encryption service with above Domain Home Location
encryptService = SerializedSystemIni.getEncryptionService(domain)
clearOrEncryptService = ClearOrEncryptedService(encryptService)
# Provide the encrypted password or username, e.g. from boot.properties
encrypted_pwd = raw_input("Provide encrypted password or username (e.g.: {AES}jNdVLr...): ")
# Clear the encrypted value from escaping characters
cleared_pwd = encrypted_pwd.replace("\\", "")
# Personal security hint :-)
raw_input("Make sure that nobody is staying behind you :-) Press ENTER to see the password ...")
# Decrypt the encrypted password or username
print "Value in cleartext is: " + clearOrEncryptService.decrypt(cleared_pwd)
#END
**********************************************************************************************
You can get the encrypted password and username from below location
cd /opt/app/oracle/middlewarer2/gc_inst/user_projects/domains/GCDomain/servers/EMGC_ADMINSERVER/security
cat boot.properties
#Generated by Configuration Wizard on Sat Oct 20 10:20:22 PDT 2012
username={AES}tFHZTUTQ5xhgS3WQicmnSPgTfFv1xswVwndUaCeb7qk=
password={AES}QZ06i3z6EAoK82eb20n0dZr+xYAxUAk26HtgmOt4Pp0=
**********************************************************************************************
export DOMAIN_HOME=/opt/app/oracle/middlewarer2/gc_inst/user_projects/domains/GCDomain
cd /opt/app/oracle/middlewarer2/oracle_common/common/bin
Make sure decrypt.py has execute permission
./wlst.sh decrypt.py
Provide Domain Home location: /opt/app/oracle/middlewarer2/gc_inst/user_projects/domains/GCDomain
Provide encrypted password or username (e.g.: {AES}jNdVLr...): {AES}tFHZTUTQ5xhgS3WQicmnSPgTfFv1xswVwndUaCeb7qk=
Now you will get password in cleartext
No comments:
Post a Comment