docker-Vulhub-weblogic

环境搭建

【Linux】使用docker搭建Apache/Nginx服务器: https://mp.weixin.qq.com/s?__biz=Mzg3MDE5OTIwNw==&mid=2247484250&idx=1&sn=7e4445c0bc4c6c3bf5351a866e823a83&chksm=ce903992f9e7b0843f5a17cf963348a17ff618badf14a07daa99eedc662e4bb46676ebcb9be5&scene=21#wechat_redirect

渗透测试环境搭建--Vulhub:https://blog.csdn.net/qq_29647709/article/details/84892582

冰蝎 v2.0.1: https://www.hedysx.com/2388.html

红蓝对抗——加密Webshell“冰蝎”攻防: http://www.secwk.com/2019/10/11/10276/

作者 利用动态二进制加密实现新型一句话木马之客户端篇:https://xz.aliyun.com/t/2799

play-with-docker: https://labs.play-with-docker.com/     ,    ubuntu安装命令: https://www.cnblogs.com/RogerLu/p/9907165.html    ,    逃逸容器并在 Play-with-Docker 服务器上执行命令: https://cloud.tencent.com/developer/news/385298

一文解密所有WebLogic密文: https://cloud.tencent.com/developer/article/1550984

Docker容器安装weblogic详细教程:https://www.cnblogs.com/DFX339/p/8493314.html

攻击

SSRF——weblogic vulhub 漏洞复现及攻击内网redis(一)(附批量检测脚本):https://www.cnblogs.com/flokz/p/weblogic_SSRF.html

Weblogic任意文件上传漏洞(CVE-2018-2894)复现: https://www.cnblogs.com/micr067/p/11609967.html

Weblogic(CVE-2017-10271)漏洞复现: https://www.cnblogs.com/xyongsec/archive/2019/07/03/11125511.html

总部的人:https://gitee.com/RichChigga/Middleware-Vulnerability-detection/tree/master/javaserializetools

口令破解

weblogic-weak-password复现:https://blog.csdn.net/qq_41954384/article/details/103831122 

Weblogic漏洞之弱口令、任意文件读取、上传shell: https://blog.csdn.net/qq_29647709/article/details/84930879

 

posted @ 2020-11-28 19:54  weiwei0123  阅读(41)  评论(0)    收藏  举报