vulhub漏洞环境搭建 https://blog.csdn.net/qq_36374896/article/details/84102101 启动docker环境 cd vulhub-master/elasticsearch/CVE-2015-5531/ sudo docker-compose up 1.5.1及以前,无需任何配置即可触发该漏洞.之后的新版,配置文件elasticsearch.yml中必须存在path.repo,该配置值为一个目录,且该目录必须可写,等于限制了备份仓库的根位置.
vi /etc/httpd/conf.d/welcom.conf <LocationMatch "^/+$"> #Options -Indexes vi /etc/httpd/conf/httpd.conf <Directory "/var/www/html"> Options Indexes FollowSymLinks Require all granted</Directory> service httpd