docker-Vulhub-weblogic
环境搭建
【Linux】使用docker搭建Apache/Nginx服务器: https://mp.weixin.qq.com/s?__biz=Mzg3MDE5OTIwNw==&mid=2247484250&idx=1&sn=7e4445c0bc4c6c3bf5351a866e823a83&chksm=ce903992f9e7b0843f5a17cf963348a17ff618badf14a07daa99eedc662e4bb46676ebcb9be5&scene=21#wechat_redirect
渗透测试环境搭建--Vulhub:https://blog.csdn.net/qq_29647709/article/details/84892582
冰蝎 v2.0.1: https://www.hedysx.com/2388.html
红蓝对抗——加密Webshell“冰蝎”攻防: http://www.secwk.com/2019/10/11/10276/
作者 利用动态二进制加密实现新型一句话木马之客户端篇:https://xz.aliyun.com/t/2799
play-with-docker: https://labs.play-with-docker.com/ , ubuntu安装命令: https://www.cnblogs.com/RogerLu/p/9907165.html , 逃逸容器并在 Play-with-Docker 服务器上执行命令: https://cloud.tencent.com/developer/news/385298
一文解密所有WebLogic密文: https://cloud.tencent.com/developer/article/1550984
Docker容器安装weblogic详细教程:https://www.cnblogs.com/DFX339/p/8493314.html
攻击
SSRF——weblogic vulhub 漏洞复现及攻击内网redis(一)(附批量检测脚本):https://www.cnblogs.com/flokz/p/weblogic_SSRF.html
Weblogic任意文件上传漏洞(CVE-2018-2894)复现: https://www.cnblogs.com/micr067/p/11609967.html
Weblogic(CVE-2017-10271)漏洞复现: https://www.cnblogs.com/xyongsec/archive/2019/07/03/11125511.html
总部的人:https://gitee.com/RichChigga/Middleware-Vulnerability-detection/tree/master/javaserializetools
口令破解
weblogic-weak-password复现:https://blog.csdn.net/qq_41954384/article/details/103831122
Weblogic漏洞之弱口令、任意文件读取、上传shell: https://blog.csdn.net/qq_29647709/article/details/84930879