破解xpach

申明:本文只用于研究,不可做他用。支持正版

生成jar包

参考链接:

https://shadowdragons.github.io/2019/03/09/xpack-crack/

https://blog.csdn.net/lilongsy/article/details/78987784

https://blog.csdn.net/qq_36666651/article/details/83539103

步骤:

  1. 拉取x-pack-core包,在本地反编译
  2. 用一样的类改代码、编译
  3. jar命令解压原来的jar包
  4. 用第二步编译出的class文件覆盖原来的
  5. 将覆盖后的目录打为jar包

启用单节点x-pack及密码访问
1、下载解压elasticsearch6.4.2的安装包,替换elasticsearch包内的modules/x-pack-core/的x-pack-core-6.4.2.jar

2、elasticsearch配置文件启用两行配置

xpack.security.enabled: true
xpack.security.transport.ssl.enabled: true

3、启动elasticsearch,启用30天的测试license,通过日志可以发现license由basic变成了trail

curl -H "Content-Type:application/json" -XPOST  http://127.0.0.1:9200/_xpack/license/start_trial?acknowledge=true

4、设置用户名密码(超级管理员用户名为elastic,这里密码设置为123456)
./elasticsearch-6.4.2/bin/elasticsearch-setup-passwords interactive

5、将license更新完白金license,通过log可以发现license由trail变为platinum,license内容(网友处理好的,到2050年):

{
	"license": {
		"uid": "9gfhf46-5g78-4f1e-b5a4-afet359bc3a3",
		"type": "platinum",
		"issue_date_in_millis": 1534723200000,
		"expiry_date_in_millis": 2544271999999,
		"max_nodes": 100,
		"issued_to": "www.plaza4me.com",
		"issuer": "Web Form",
		"signature": "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",
		"start_date_in_millis": 1534723200000
	}
}

更新license命令:

curl -XPUT -u "elastic:123456" -H "Content-Type:application/json" -v "http://127.0.0.1:9200/_xpack/license?acknowledge=true" -d @license.json

6、查看elasticsearch的license有效期
curl -XGET -u elastic:123456 -H "Content-Type: application/json" -v "http://127.0.0.1:9200/_license"
1
可以看到过期时间为2050年:

{
  "license" : {
    "status" : "active",
    "uid" : "9gfhf46-5g78-4f1e-b5a4-afet359bc3a3",
    "type" : "platinum",
    "issue_date" : "2018-08-20T00:00:00.000Z",
    "issue_date_in_millis" : 1534723200000,
    "expiry_date" : "2050-08-16T14:13:19.999Z",
    "expiry_date_in_millis" : 2544271999999,
    "max_nodes" : 100,
    "issued_to" : "www.plaza4me.com",
    "issuer" : "Web Form",
    "start_date_in_millis" : 1534723200000
  }
}

然后x-pack就启用破解成功了,访问elasticsearch,kibana时就需要密码验证了。

启用集群ssl(6.4.2集群使用x-pack必须使用TLS/SSL加密)
1、关闭所有节点

2、启用集群安全选项,将配置文件开头关于安全部分的配置启用即可

3、启动ssl配置,以下操作证书相关密码皆为空,非空的具体操作请参考官方文档
官方文档:https://www.elastic.co/guide/en/elasticsearch/reference/6.4/configuring-tls.html#enable-ssl

# 为es集群创建证书颁发机构,这一步会生成elastic-stack-ca.p12文件
./elasticsearch-6.4.2/bin/elasticsearch-certutil ca
# 为每个节点生成证书和私钥,这一步会生成elastic-certificates.p12文件
./elasticsearch-6.4.2/bin/elasticsearch-certutil cert --ca elastic-stack-ca.p12 
mkdir -pv ./elasticsearch-6.4.2/config/certs
mv elastic-certificates.p12 ./elasticsearch-6.4.2/config/certs/

4、将第三步生成的elastic-certificates.p12放到每个节点的./elasticsearch-6.4.2/config/certs/目录下

5、启动集群,这时外部访问就是https,同时也需要用户名密码

修改kibana配置文件

elasticsearch.username: "elastic"
elasticsearch.password: "123456"

猜你喜欢

转载自www.cnblogs.com/daleyzou/p/researchXPack.html
今日推荐